Sciweavers

1448 search results - page 54 / 290
» Restricted Stack Implementations
Sort
View
CCS
2000
ACM
13 years 12 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
CSFW
1995
IEEE
13 years 11 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
VR
2008
IEEE
174views Virtual Reality» more  VR 2008»
13 years 6 months ago
Stable haptic interaction using a damping model to implement a realistic tooth-cutting simulation for dental training
It is difficult to implement a stable and realistic haptic simulation for cutting rigid objects that is based on a damping model because of an inevitable conflict between stability...
Guanyang Liu, Yuru Zhang, Dangxiao Wang, William T...
SAC
2006
ACM
14 years 1 months ago
Implementing an embedded GPU language by combining translation and generation
Dynamic languages typically allow programs to be written y high level of abstraction. But their dynamic nature makes it very hard to compile such languages, meaning that a price h...
Calle Lejdfors, Lennart Ohlsson
ASIASIM
2004
Springer
14 years 1 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...