Sciweavers

780 search results - page 62 / 156
» Introduction to Special Issue
Sort
View
114
Voted
ER
1999
Springer
146views Database» more  ER 1999»
15 years 6 months ago
"Modeling-by-Patterns" of Web Applications
“A pattern ... describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can us...
Franca Garzotto, Paolo Paolini, Davide Bolchini, S...
115
Voted
ACSAC
1998
IEEE
15 years 6 months ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
131
Voted
NDSS
1998
IEEE
15 years 6 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
121
Voted
VISUALIZATION
1998
IEEE
15 years 6 months ago
Progressive tetrahedralizations
This paper describes some fundamental issues for robust implementations of progressively refined tetrahedralizations generated through sequences of edge collapses. We address the ...
Oliver G. Staadt, Markus H. Gross
94
Voted
GLVLSI
1997
IEEE
105views VLSI» more  GLVLSI 1997»
15 years 6 months ago
OLIVIA: Objectoriented Logicsimulation Implementing the VITAL Standard
In a VHDL-based design flow for applicationspecific integrated circuits, VITAL provides a uniform methodology for developing ASIC libraries for signoff simulation. The VITAL Sta...
Josef Fleischmann, Rolf Schlagenhaft, Martin Pelle...