Sciweavers

2392 search results - page 172 / 479
» informs 2000
Sort
View
CSFW
2000
IEEE
15 years 8 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
IPPS
2000
IEEE
15 years 8 months ago
Reconfigurable Parallel Sorting and Load Balancing on a Beowulf Cluster: HeteroSort
HeteroSort load balances and sorts within static or dynamic networks using a conceptual torus mesh. We ported HeteroSort to a 16-node Beowulf cluster with a central switch architec...
Pamela Yang, Timothy M. Kunau, Bonnie Holte Bennet...
ETS
2000
IEEE
93views Hardware» more  ETS 2000»
15 years 4 months ago
OWL: A Recommender System for Organization-Wide Learning
Wedescribe the use of a recommendersystem to enable continuousknowledgeacquisition and individualized tutoring of application software across an organization. Installing such syst...
Frank Linton, Deborah Joy, Hans-Peter Schaefer, An...
DIGITALCITIES
2001
Springer
15 years 9 months ago
Connecting Digital and Physical Cities
As a platform for community networks, public information spaces that mirror the city metaphor are being developed around the world. The aim of digital cities is to pursue a future ...
Toru Ishida, Hiroshi Ishiguro, Hideyuki Nakanishi
ICVS
2001
Springer
15 years 8 months ago
A Real-Time Vision Module for Interactive Perceptual Agents
Interactive robotics demands real-time visual information about the environment. Real time vision processing, however, places a heavy load on the robot’s limited resources, and m...
Bruce A. Maxwell, Nathaniel Fairfield, Nikolas Joh...