Sciweavers

6768 search results - page 1227 / 1354
» Developing Applications Using Model-Driven Design Environmen...
Sort
View
ISSA
2004
15 years 4 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
15 years 3 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
CORR
2008
Springer
88views Education» more  CORR 2008»
15 years 3 months ago
The Korrontea Data Modeling
Needs of multimedia systems evolved due to the evolution of their architecture which is now distributed into heterogeneous contexts. A critical issue lies in the fact that they ha...
Emmanuel Bouix, Philippe Roose, Marc Dalmau
TVCG
2008
140views more  TVCG 2008»
15 years 3 months ago
Efficient Morse Decompositions of Vector Fields
Vector field analysis plays a crucial role in many engineering applications, such as weather prediction, tsunami and hurricane study, and airplane and automotive design. Existing ...
Guoning Chen, Konstantin Mischaikow, Robert S. Lar...
JUCS
2007
124views more  JUCS 2007»
15 years 3 months ago
Pipeline-scheduling Simulator for Educational Purpose
: This paper presents a project that provides both, to professors and to students, a tool that is useful for studying, teaching and learning how pipelines work and how they can be ...
José M. Chaves-González, Miguel A. V...
« Prev « First page 1227 / 1354 Last » Next »