Sciweavers

12373 search results - page 2246 / 2475
» Semi-Logarithmic Number Systems
Sort
View
ACSAC
1998
IEEE
15 years 8 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
DATE
1998
IEEE
153views Hardware» more  DATE 1998»
15 years 8 months ago
An Energy-Conscious Exploration Methodology for Reconfigurable DSPs
As the "system-on-a-chip" concept is rapidly becoming a reality, time-to-market and product complexity push the reuse of complex macromodules. Circuits combining a varie...
Jan M. Rabaey, Marlene Wan
HCW
1998
IEEE
15 years 8 months ago
Implementing Distributed Synthetic Forces Simulations in Metacomputing Environments
A distributed, parallel implementation of the widely used Modular Semi-Automated Forces ModSAF Distributed Interactive Simulation DIS is presented, with Scalable Parallel Processo...
Sharon Brunett, Dan Davis, Thomas Gottschalk, Paul...
MMB
1999
Springer
249views Communications» more  MMB 1999»
15 years 8 months ago
A Development Platform for the Design and Optimization of Mobile Radio Networks
The rapidly increasing traffic demand from mobile users forces network operators and service providers to extend and optimize existing networks as well as to plan entirely new mo...
Jürgen Deissner, Gerhard Fettweis, Jörg ...
ROBOCUP
1999
Springer
113views Robotics» more  ROBOCUP 1999»
15 years 8 months ago
11Monkeys Description
The major purpose of our research is to study cooperative planning for multi-agent system in time-critical environment. The RoboCup simulator league is the most interesting target ...
Shuhei Kinoshita, Yoshikazu Yamamoto
« Prev « First page 2246 / 2475 Last » Next »