Sciweavers

7811 search results - page 1440 / 1563
» computing 2004
Sort
View
VRML
2004
ACM
15 years 8 months ago
A VRML97-X3D extension for massive scenery management in virtual worlds
In this paper we present a VRML97-X3D extension to describe precomputed visibility relationships in the context of progressive transmission as well as real time visualization of m...
Jean-Eudes Marvie, Kadi Bouatouch
CCGRID
2004
IEEE
15 years 7 months ago
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optical networks
Next generation applications and architectures (for example, Grids) are driving radical changes in the nature of traffic, service models, technology, and cost, creating opportunit...
Tal Lavian, Joe Mambretti, Doug Cutrell, Howard J....
121
Voted
DSN
2004
IEEE
15 years 7 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
NAR
2007
115views more  NAR 2007»
15 years 2 months ago
DroSpeGe: rapid access database for new Drosophila species genomes
The Drosophila species comparative genome database DroSpeGe (http://insects.eugenes.org/ DroSpeGe/) provides genome researchers with rapid, usable access to 12 new and old Drosoph...
Donald G. Gilbert
MOBICOM
2004
ACM
15 years 8 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
« Prev « First page 1440 / 1563 Last » Next »