Sciweavers

11718 search results - page 2107 / 2344
» Testing database applications
Sort
View
CMS
2001
119views Communications» more  CMS 2001»
15 years 3 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
DGO
2003
175views Education» more  DGO 2003»
15 years 3 months ago
Coastal Mapping and Change Detection Using High--Resolution IKONOS Satellite Imagery
Shoreline mapping and shoreline change detection are critical in many coastal zone applications. This paper presents results of the semi-automatic mapping of a coastal area of Lak...
Kaichang Di, Ruijin Ma, Jue Wang, Ron Li
ISSA
2004
15 years 3 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
IWEC
2004
15 years 3 months ago
New Behavioural Approaches for Virtual Environments
We describe a new approach to the behaviour of 3D environments that supports the definition of physical processes and interactive phenomena. The work takes as a starting point the ...
Marc Cavazza, Simon Hartley, Jean-Luc Lugrin, Paol...
97
Voted
IJCAI
2001
15 years 3 months ago
Backjumping for Quantified Boolean Logic Satisfiability
The implementation of effective reasoning tools for deciding the satisfiability of Quantified Boolean Formulas (QBFs) is an important research issue in Artificial Intelligence. Ma...
Enrico Giunchiglia, Massimo Narizzano, Armando Tac...
« Prev « First page 2107 / 2344 Last » Next »