Sciweavers

23406 search results - page 4598 / 4682
» Architecture, Design, Implementation
Sort
View
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 2 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
VISUALIZATION
2000
IEEE
15 years 2 months ago
On-the-Fly rendering of losslessly compressed irregular volume data
Very large irregular-grid data sets are represented as tetrahedral meshes and may incur significant disk I/O access overhead in the rendering process. An effective way to allevia...
Chuan-Kai Yang, Tulika Mitra, Tzi-cker Chiueh
DOLAP
2000
ACM
15 years 2 months ago
CUBIST: A New Algorithm For Improving the Performance of Ad-hoc OLAP Queries
Being able to efficiently answer arbitrary OLAP queries that aggregate along any combination of dimensions over numerical and categorical attributes has been a continued, major co...
Lixin Fu, Joachim Hammer
IUI
2000
ACM
15 years 2 months ago
Adaptive medical information delivery combining user, task and situation models
Medical information delivery for users with different levels of expertise will be required for the manned mission to Mars due to limited potential for communication with Earth. Th...
Luis Francisco-Revilla, Frank M. Shipman III
SAC
2000
ACM
15 years 2 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
« Prev « First page 4598 / 4682 Last » Next »