Sciweavers

8086 search results - page 1586 / 1618
» On the Implementation of Dynamic Patterns
Sort
View
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 4 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
160
Voted
FAST
2004
15 years 4 months ago
CAR: Clock with Adaptive Replacement
CLOCK is a classical cache replacement policy dating back to 1968 that was proposed as a low-complexity approximation to LRU. On every cache hit, the policy LRU needs to move the a...
Sorav Bansal, Dharmendra S. Modha
GEOINFO
2004
15 years 4 months ago
Parallel Volume Rendering for Ocean Visualization in a Cluster of PCs
Volume rendering techniques can be very useful in geographical information systems to provide meaningful and visual information about the surface and the interior of 3D datasets. ...
Alexandre Coelho, Marcio Nascimento, Cristiana Ben...
122
Voted
IADIS
2004
15 years 4 months ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...
CGIM
2003
15 years 4 months ago
Snake for Band Edge Extraction and Its Applications
A novel snake model suitable for edge extraction of bandshape objects is presented in this paper. Based on the proposed model, an edge tracking system, EdgeTrak, has been develope...
Min Li, Chandra Kambhamettu, Maureen C. Stone
« Prev « First page 1586 / 1618 Last » Next »