Sciweavers

2799 search results - page 491 / 560
» computing 1998
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NIPS
1998
13 years 11 months ago
A Phase Space Approach to Minimax Entropy Learning and the Minutemax Approximations
There has been much recent work on measuring image statistics and on learning probability distributions on images. We observe that the mapping from images to statistics is many-to...
James M. Coughlan, Alan L. Yuille
NIPS
1998
13 years 11 months ago
Coding Time-Varying Signals Using Sparse, Shift-Invariant Representations
A common way to represent a time series is to divide it into shortduration blocks, each of which is then represented by a set of basis functions. A limitation of this approach, ho...
Michael S. Lewicki, Terrence J. Sejnowski
WSC
1998
13 years 11 months ago
Advanced Uses for Micro Saint Simulation Software
Simulation is fast becoming THE software tool for the 1990's. More companies each year are taking advantage of the ease of use of simulation software and see the benefits to ...
Catherine Drury Barnes, K. Ronald Laughery Jr.
WSC
1998
13 years 11 months ago
Implementations of Dispatch Rules in Parallel Manufacturing Simulation
Most features in commercial simulation packages are often omitted in parallel simulation benchmarks, because they neither affect the overall correctness of the simulation protocol...
Chu-Cheow Lim, Yoke-Hean Low, Boon-Ping Gan, Sanja...