Sciweavers

861 search results - page 126 / 173
» Internal implementation
Sort
View
INFORMATICALT
2000
114views more  INFORMATICALT 2000»
14 years 9 months ago
The Language-Centric Program Generator Models: 3L Paradigm
Abstract. In this paper we suggest a three-language (3L) paradigm for building the program generator models. The basis of the paradigm is a relationship model of the specification,...
Vytautas Stuikys, Giedrius Ziberkas, Robertas Dama...
CAD
1998
Springer
14 years 9 months ago
Tool profile and tool path calculation for free-form thick-layered fabrication
• In several application fields, large sized, free-form objects of various soft materials are widely used. Available layered prototyping technologies cannot be applied for fabri...
Imre Horváth, Joris S. M. Vergeest, Johan J...
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 9 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
IJMI
2002
142views more  IJMI 2002»
14 years 9 months ago
Quality assured trusted third parties for deploying secure internet-based healthcare applications
In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
IJWIN
2002
154views more  IJWIN 2002»
14 years 9 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung