Sciweavers

8413 search results - page 1326 / 1683
» Ordering Problem Subgoals
Sort
View
137
Voted
ICNP
1998
IEEE
15 years 9 months ago
A Proof Technique for Liveness Properties of Multifunction Composite Protocols
In protocol composition techniques, component protocols are combined in various ways to obtain a complex protocol whose execution sequences consist of interleaved execution sequen...
J. Park, R. Miller
ICNP
1998
IEEE
15 years 9 months ago
Controlling Quality of Session in Adaptive Multimedia Multicast Systems
Controlling the quality of collaborative multimedia sessions, that deploy multiple media streams, is a challenging problem. In this paper, we present a framework for achieving qua...
Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly
RAID
1999
Springer
15 years 9 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
161
Voted
SAFECOMP
1999
Springer
15 years 9 months ago
Hierarchically Performed Hazard Origin and Propagation Studies
Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
Yiannis Papadopoulos, John A. McDermid
VISUALIZATION
1998
IEEE
15 years 9 months ago
Hierarchical volume analysis and visualization based on morphological operators
One common problem in the practical application of volume visualization is the proper choice of transfer functions in order to color different parts of the volume meaningfully. Th...
Christoph Lürig, Thomas Ertl
« Prev « First page 1326 / 1683 Last » Next »