Sciweavers

2309 search results - page 171 / 462
» Patterns for Technology Companies
Sort
View
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
15 years 9 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
CAD
2000
Springer
15 years 9 months ago
Effektiver Informationsaustausch durch ORDBS-basiertes Web Content Management
: Web Information Systems (WISs) embody a core technology for all larger enterprises. WISs are employed in an intranet or extranet for internal information interchange or communica...
Henrik Loeser, Budi Surjanto
ISHPC
1999
Springer
15 years 9 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson
139
Voted
VRML
1998
ACM
15 years 9 months ago
3D Product Presentation Online: The Virtual Design Exhibition
VRML offers a high potential for product presentation: Instead of regarding flat, static pictures, configurable and animated 3D models embedded in entertaining environments provid...
J. Dauner, Jürgen Landauer, E. Stimpfig, D. R...
KDD
1998
ACM
164views Data Mining» more  KDD 1998»
15 years 9 months ago
A Data Mining Support Environment and its Application on Insurance Data
Huge masses of digital data about products, customers and competitors have become available for companies in the services sector. In order to exploit its inherent (and often hidde...
Martin Staudt, Jörg-Uwe Kietz, Ulrich Reimer