Sciweavers

11 search results - page 1 / 3
» wetice 1997
Sort
View
67
Voted
WETICE
1997
IEEE
15 years 2 months ago
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm
Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yah...
79
Voted
WETICE
1997
IEEE
15 years 2 months ago
Design of the Interactive Sharing Transfer Protocol
Richard C. Waters, David B. Anderson, Derek L. Sch...
73
Voted
WETICE
1997
IEEE
15 years 2 months ago
Virtual Reality Transfer Protocol (VRTP) Design Rationale
Donald P. Brutzman, Michael Zyda, Kent Watsen, Mic...
87
Voted
WETICE
1997
IEEE
15 years 2 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
80
Voted
WETICE
1997
IEEE
15 years 2 months ago
Boundaries, Awareness and Interaction in Collaborative Virtual Environments
This paper is concerned with how collaborative virtual environments can be structured in order to enable greater scalability and yet maintain a richness of communication. Based on...
Chris Greenhalgh, Steve Benford