Sciweavers

6274 search results - page 1092 / 1255
» Proofs, Programs, Processes
Sort
View
IFIP
2004
Springer
14 years 4 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
ISMIR
2004
Springer
159views Music» more  ISMIR 2004»
14 years 4 months ago
Towards an Efficient Algorithm for Automatic Score-to-Audio Synchronization
In the last few years, several algorithms for the automatic alignment of audio and score data corresponding to the same piece of music have been proposed. Among the major drawback...
Meinard Müller, Frank Kurth, Tido Röder
IWAN
2004
Springer
14 years 4 months ago
Dynamic Link Measurements Using Active Components
Active and programmable network technologies strive to support completely new forms of data-path processing capabilities inside the network. This in conjunction with the ability to...
Dimitrios P. Pezaros, Manolis Sifalakis, Stefan Sc...
IWAN
2004
Springer
14 years 4 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
JELIA
2004
Springer
14 years 4 months ago
Hierarchical Decision Making by Autonomous Agents
Abstract. Often, decision making involves autonomous agents that are structured in a complex hierarchy, representing e.g. authority. Typically the agents share the same body of kno...
Stijn Heymans, Davy Van Nieuwenborgh, Dirk Vermeir
« Prev « First page 1092 / 1255 Last » Next »