Sciweavers

25316 search results - page 4867 / 5064
» Computational sensor networks
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 3 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
101
Voted
JDM
2000
128views more  JDM 2000»
15 years 3 months ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
142
Voted
ETS
2002
IEEE
166views Hardware» more  ETS 2002»
15 years 3 months ago
Distributed and Online Distance Lecturing Environment (The Virtual Blackboard Project)
Computers and networks are increasingly able to support distributed collaborative multimedia applications. In fact, the growing interest in distance learning reflects the awarenes...
Yiannis N. Sagias
110
Voted
FMSD
2002
92views more  FMSD 2002»
15 years 3 months ago
A Simple, Object-Based View of Multiprogramming
Object-based sequential programming has had a major impact on software engineering. However, object-based concurrent programming remains elusive as an effective programming tool. T...
Jayadev Misra
149
Voted
HEURISTICS
2002
99views more  HEURISTICS 2002»
15 years 3 months ago
Parallelizing Tabu Search on a Cluster of Heterogeneous Workstations
In this paper, we present the parallelization of tabu search on a network of workstations using PVM. Two parallelization strategies are integrated: functional decomposition strate...
Ahmad A. Al-Yamani, Sadiq M. Sait, Habib Youssef, ...
« Prev « First page 4867 / 5064 Last » Next »