Sciweavers

780 search results - page 62 / 156
» Introduction to Special Issue
Sort
View
ER
1999
Springer
146views Database» more  ER 1999»
14 years 1 months ago
"Modeling-by-Patterns" of Web Applications
“A pattern ... describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can us...
Franca Garzotto, Paolo Paolini, Davide Bolchini, S...
ACSAC
1998
IEEE
14 years 1 months ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
NDSS
1998
IEEE
14 years 1 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
VISUALIZATION
1998
IEEE
14 years 1 months ago
Progressive tetrahedralizations
This paper describes some fundamental issues for robust implementations of progressively refined tetrahedralizations generated through sequences of edge collapses. We address the ...
Oliver G. Staadt, Markus H. Gross
GLVLSI
1997
IEEE
105views VLSI» more  GLVLSI 1997»
14 years 1 months ago
OLIVIA: Objectoriented Logicsimulation Implementing the VITAL Standard
In a VHDL-based design flow for applicationspecific integrated circuits, VITAL provides a uniform methodology for developing ASIC libraries for signoff simulation. The VITAL Sta...
Josef Fleischmann, Rolf Schlagenhaft, Martin Pelle...