Sciweavers

24741 search results - page 4752 / 4949
» Virtual Network Computing
Sort
View
91
Voted
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 28 days ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
77
Voted
JDM
2000
128views more  JDM 2000»
15 years 28 days ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
89
Voted
FMSD
2002
92views more  FMSD 2002»
15 years 28 days ago
A Simple, Object-Based View of Multiprogramming
Object-based sequential programming has had a major impact on software engineering. However, object-based concurrent programming remains elusive as an effective programming tool. T...
Jayadev Misra
124
Voted
HEURISTICS
2002
99views more  HEURISTICS 2002»
15 years 28 days ago
Parallelizing Tabu Search on a Cluster of Heterogeneous Workstations
In this paper, we present the parallelization of tabu search on a network of workstations using PVM. Two parallelization strategies are integrated: functional decomposition strate...
Ahmad A. Al-Yamani, Sadiq M. Sait, Habib Youssef, ...
138
Voted
CGF
1998
134views more  CGF 1998»
15 years 25 days ago
Progressive Iso-Surface Extraction from Hierarchical 3D Meshes
A multiresolution data decomposition offers a fundamental framework supporting compression, progressive transmission, and level-of-detail (LOD) control for large two or three dime...
Wenli Cai, Georgios Sakas, Roberto Grosso, Thomas ...
« Prev « First page 4752 / 4949 Last » Next »