Sciweavers

2063 search results - page 247 / 413
» connection 2007
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 6 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
GRAPHICSINTERFACE
2000
15 years 6 months ago
Using a 3D Puzzle as a Metaphor for Learning Spatial Relations
We introduce a new metaphor for learning spatial relations--the 3D puzzle. With this metaphor users learn spatial relations by assembling a geometric model themselves. For this pu...
Bernhard Preim, Felix Ritter, Oliver Deussen, Thom...
MASCOTS
1998
15 years 6 months ago
Performance Analysis of Cellular Mobile Communication Networks Supporting Multimedia Services
This paper illustrates the development of an approximate analytical model for a communication network providing integrated services to a population of mobile users, and presents p...
Marco Ajmone Marsan, Salvatore Marano, Carlo Mastr...
CCCG
1997
15 years 6 months ago
On the number of internal and external visibility edges of polygons
In this paper we prove that for any simple polygon P with n vertices, the sum of the number of strictly internal edges and the number of strictly external visibility edges of P is...
Jorge Urrutia
NETWORKING
2000
15 years 6 months ago
Performance of Short TCP Transfers
Many works have studied the negative impact of slow start on the performance of short transfers. Some works propose to accelerate the window increase during this phase in order to ...
Chadi Barakat, Eitan Altman