Sciweavers

1512 search results - page 240 / 303
» Principles of IEEE 802.11s
Sort
View
MICRO
1999
IEEE
138views Hardware» more  MICRO 1999»
14 years 1 months ago
Dynamic 3D Graphics Workload Characterization and the Architectural Implications
Although PC-class 3D graphics hardware has made significant strides in the last several years, the underlying architectural design principles are still generally considered as a b...
Tulika Mitra, Tzi-cker Chiueh
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
14 years 1 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 1 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
TPHOL
1999
IEEE
14 years 1 months ago
Isar - A Generic Interpretative Approach to Readable Formal Proof Documents
Abstract. We present a generic approach to readable formal proof documents, called Intelligible semi-automated reasoning (Isar). It addresses the major problem of existing interact...
Markus Wenzel
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
14 years 1 months ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara