Sciweavers

14824 search results - page 2644 / 2965
» Security - Introduction
Sort
View
INFOCOM
2000
IEEE
15 years 7 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....
ISCC
2000
IEEE
15 years 7 months ago
IsoWAN: A NASA Science and Engineering Information and Services Framework
We believe that the next evolutionary step in supporting wide-area application and services delivery to customers is a network framework that provides for collocation of applicati...
David J. Korsmeyer, Edward T. Chow, Michael P. Con...
SBRN
2000
IEEE
15 years 7 months ago
Non-Linear Modelling and Chaotic Neural Networks
This paper proposes a simple methodology to construct an iterative neural network which mimics a given chaotic time series. The methodology uses the Gamma test to identify a suita...
Antonia J. Jones, Steve Margetts, Peter Durrant, A...
150
Voted
VL
2000
IEEE
120views Visual Languages» more  VL 2000»
15 years 7 months ago
Visualizing the Synchronization of Java-Threads with UML
Concurrent programming is a complex task, even with modern languages such as Java who provide languagebased support for multithreading and synchronization. In addition to typical ...
Katharina Mehner, Annika Wagner
107
Voted
SAC
2000
ACM
15 years 7 months ago
XML Dataspaces for Mobile Agent Coordination
This paper presents XMARS, a programmable coordination architecture for Internet applications based on mobile agents. In XMARS, agents coordinate – both with each other and with...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
« Prev « First page 2644 / 2965 Last » Next »