Sciweavers

4233 search results - page 695 / 847
» Three Paths to Effectiveness
Sort
View
DSN
2004
IEEE
15 years 8 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
AFRIGRAPH
2003
ACM
15 years 8 months ago
Rendering optimisations for stylised sketching
We present work that specifically pertains to the rendering stage of stylised, non-photorealistic sketching. While a substantial body of work has been published on geometric optim...
Holger Winnemöller, Shaun Bangay
ECCE
2007
15 years 6 months ago
Lateral control support for car drivers: a human-machine cooperation approach
Motivation – This paper is based on a research project which examines the way car drivers and automated devices cooperate to achieve lateral control of a vehicle. A theoretical ...
Jordan Navarro, Franck Mars, Jean-Michel Hoc
IE
2007
15 years 6 months ago
Speaking in character: using voice-over-IP to communicate within MMORPGs
While voice-over-IP has long been favoured as a communication medium by players of team-based online shooter games, it has recently also been appropriated by players of MMORPGs, a...
Greg Wadley, Martin R. Gibbs, Peter Benda
EJC
2007
15 years 5 months ago
On the Construction of Ontologies based on Natural Language Semantic
instrumental roles in titles of medical abstracts: a combined conceptual and modelling UML approach Topic – This paper provides a detailed description of the instrumental role in...
Terje Aaberge