Sciweavers

24741 search results - page 4752 / 4949
» Virtual Network Computing
Sort
View
102
Voted
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 2 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
JDM
2000
128views more  JDM 2000»
15 years 2 months ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
98
Voted
FMSD
2002
92views more  FMSD 2002»
15 years 2 months ago
A Simple, Object-Based View of Multiprogramming
Object-based sequential programming has had a major impact on software engineering. However, object-based concurrent programming remains elusive as an effective programming tool. T...
Jayadev Misra
HEURISTICS
2002
99views more  HEURISTICS 2002»
15 years 2 months ago
Parallelizing Tabu Search on a Cluster of Heterogeneous Workstations
In this paper, we present the parallelization of tabu search on a network of workstations using PVM. Two parallelization strategies are integrated: functional decomposition strate...
Ahmad A. Al-Yamani, Sadiq M. Sait, Habib Youssef, ...
CGF
1998
134views more  CGF 1998»
15 years 2 months ago
Progressive Iso-Surface Extraction from Hierarchical 3D Meshes
A multiresolution data decomposition offers a fundamental framework supporting compression, progressive transmission, and level-of-detail (LOD) control for large two or three dime...
Wenli Cai, Georgios Sakas, Roberto Grosso, Thomas ...
« Prev « First page 4752 / 4949 Last » Next »