Sciweavers

16430 search results - page 3223 / 3286
» On Computable Tree Functions
Sort
View
ISSA
2004
13 years 9 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
ICHIM
2001
104views more  ICHIM 2001»
13 years 9 months ago
The New Norwegian Rock Art Database
The Rock Art Project was set up by the Directorate for Cultural Heritage on behalf of the Norwegian Ministry of the Environment in 1996. The database was initiated within the EU-s...
Wenche Helliksen, Inger Marie Holm-Olsen, Olaug Ha...
ICHIM
2001
123views more  ICHIM 2001»
13 years 9 months ago
Digital Video and Hypermedia Based New Services for Working on Patrimonial Archives
The "Institut National de I'Audiovisuel" (1NA) is in charge of keeping records of national TV broadcasts. Its main function is to provide TV producers with authenti...
Marc Nanard, Jocelyne Nanard, David Genest, Michel...
VMV
2004
185views Visualization» more  VMV 2004»
13 years 9 months ago
Convexification of Unstructured Grids
Unstructured tetrahedral grids are a common data representation of three-dimensional scalar fields. For convex unstructured meshes efficient rendering methods are known. For conca...
Stefan Röttger, Stefan Guthe, Andreas Schiebe...
DYNAMO
2000
87views more  DYNAMO 2000»
13 years 9 months ago
Derive: a tool that automatically reverse-engineers instruction encodings
Many binary tools, such as disassemblers, dynamiccode generation systems, and executable code rewriters, need to understand how machine instructions are encoded. Unfortunately, sp...
Dawson R. Engler, Wilson C. Hsieh
« Prev « First page 3223 / 3286 Last » Next »