Sciweavers

5252 search results - page 938 / 1051
» Logic in Access Control
Sort
View
WICON
2008
15 years 5 months ago
The effect of cooperation at the network protocol level
Abstract--There has been a great deal of attention on cooperative communication which exploits the spatial diversity among antennas belonging to multiple terminals. Most of the exi...
Beiyu Rong, Anthony Ephremides
DELOS
2004
15 years 5 months ago
Peer-to-Peer Overlays and Data Integration in a Life Science Grid
Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the act...
Curt Cramer, Andrea Schafferhans, Thomas Fuhrmann
ICETE
2004
204views Business» more  ICETE 2004»
15 years 5 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
USENIX
1994
15 years 5 months ago
Acme: A User Interface for Programmers
A hybrid of window system, shell, and editor, Acme gives text-oriented applications a clean, expressive, and consistent style of interaction. Traditional window systems support in...
Rob Pike
WSC
1994
15 years 5 months ago
General purpose simulation with stroboscope
Stroboscope is a programming language designed for the simulation of processes common to construction engineering. These processes are very complex and involve many different type...
Julio C. Martínez, Photios G. Ioannou