Sciweavers

8501 search results - page 1516 / 1701
» Reactive process networks
Sort
View
ACSAC
1998
IEEE
15 years 9 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
ICVS
1999
Springer
15 years 9 months ago
Ascender II, a Visual Framework for 3D Reconstruction
This paper presents interim results from an ongoing project on aerial image reconstruction. One important task in image interpretation is the process of understanding and identifyi...
Maurício Marengoni, Christopher O. Jaynes, ...
178
Voted
RECOMB
1999
Springer
15 years 9 months ago
Evolution of metabolisms: a new method for the comparison of metabolic pathways
The abundance of information provided by completely sequenced genomes de nes a starting point for new insights in the multilevel organization of organisms and their evolution. At ...
Christian V. Forst, Klaus Schulten
137
Voted
INFOCOM
1998
IEEE
15 years 9 months ago
Routing Lookups in Hardware at Memory Access Speeds
Increased bandwidth in the Internet puts great demands on network routers; for example, to route minimum sized Gigabit Ethernet packets, an IP router must process about packets pe...
Pankaj Gupta, Steven Lin, Nick McKeown
115
Voted
EUROMICRO
1997
IEEE
15 years 9 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
« Prev « First page 1516 / 1701 Last » Next »