Sciweavers

34181 search results - page 6594 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
RIDE
1999
IEEE
15 years 8 months ago
WISE: Business to Business E-Commerce
The Internet and the proliferation of inexpensive computing power in the form of clusters of workstations or PCs provide the basic hardware infrastructure for business to business...
Gustavo Alonso, Ulrich Fiedler, Claus Hagen, Amaia...
EUROCRYPT
1999
Springer
15 years 8 months ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 8 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
FPL
1999
Springer
147views Hardware» more  FPL 1999»
15 years 8 months ago
Synthia: Synthesis of Interacting Automata Targeting LUT-based FPGAs
This paper details the development, implementation, and results of Synthia, a system for the synthesis of Finite State Machines (FSMs) to field-programmable logic. Our approach us...
George A. Constantinides, Peter Y. K. Cheung, Wayn...
VR
1999
IEEE
167views Virtual Reality» more  VR 1999»
15 years 8 months ago
User-Centered Design and Evaluation of a Real-Time Battlefield Visualization Virtual Environment
The ever-increasing power of computers and hardware rendering systems has, to date, primarily motivated the creation of visually rich and perceptually realistic virtual environmen...
Deborah Hix, J. Edward Swan II, Joseph L. Gabbard,...
« Prev « First page 6594 / 6837 Last » Next »