Sciweavers

4761 search results - page 727 / 953
» Generalizing Boundary Points
Sort
View
CCS
2000
ACM
15 years 9 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
DIGITALCITIES
2000
Springer
15 years 9 months ago
Extending the Services and the Accessibility of Community Networks
Community networks are community-oriented information and communication systems that are generally patterned after the public library’s model of free, inclusive service and commi...
Antonietta Grasso, Dave Snowdon, Michael Koch
ECAI
2000
Springer
15 years 8 months ago
Architecture for Agent Programming Languages
As the field of agent-based systems continues to expand rapidly, one of the most significant problems lies in being able to compare and evaluate the relative benefits and disad...
Koen V. Hindriks, Mark d'Inverno, Michael Luck
HT
2010
ACM
15 years 8 months ago
Of kings, traffic signs and flowers: exploring navigation of tagged documents
Many popular Web 2.0 sites support navigation of tagged web resources. The tag-based navigation has been described as a lightweight reorientation of view on tags and the associate...
Jacek Gwizdka
ASPDAC
1999
ACM
122views Hardware» more  ASPDAC 1999»
15 years 8 months ago
A Clustering Based Linear Ordering Algorithm for K-Way Spectral Partitioning
The spectral method can lead to a high quality of multi-way partition due to its ability to capture global netlist information. For spectral partition, n netlist modules are mappe...
Shiuann-Shiuh Lin, Wen-Hsin Chen, Wen-Wei Lin, Tin...