Sciweavers

8621 search results - page 1681 / 1725
» Interaction Design
Sort
View
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 1 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
VVS
2000
IEEE
128views Visualization» more  VVS 2000»
14 years 1 months ago
The ULTRAVIS system
This paper describes architecture and implementation of the ULTRAVIS system, a pure software solution for versatile and fast volume rendering. It provides perspective raycasting, ...
Günter Knittel
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
14 years 1 months ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle
EDBT
2000
ACM
14 years 1 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...
SIGGRAPH
1999
ACM
14 years 1 months ago
Creating a Live Broadcast from a Virtual Environment
“Inhabited Television” combines multiuser virtual environments with television, so that online audience-members can participate in TV shows staged in a virtual world. It is pr...
Chris Greenhalgh, John Bowers, Graham Walker, John...
« Prev « First page 1681 / 1725 Last » Next »