Sciweavers

8135 search results - page 1405 / 1627
» network 2008
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 3 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
SIAMJO
2000
101views more  SIAMJO 2000»
15 years 3 months ago
An Efficient Algorithm for Minimizing a Sum of p-Norms
We study the problem of minimizing a sum of p-norms where p is a fixed real number in the interval [1, ]. Several practical algorithms have been proposed to solve this problem. How...
Guoliang Xue, Yinyu Ye
CGF
1998
134views more  CGF 1998»
15 years 3 months ago
Progressive Iso-Surface Extraction from Hierarchical 3D Meshes
A multiresolution data decomposition offers a fundamental framework supporting compression, progressive transmission, and level-of-detail (LOD) control for large two or three dime...
Wenli Cai, Georgios Sakas, Roberto Grosso, Thomas ...
CLEIEJ
1998
57views more  CLEIEJ 1998»
15 years 3 months ago
User-Level Parallel File I/O
Parallel disk I/O subsystems are becoming more important in today’s large-scale parallel machines. Parallel disk systems provide a significant boost in I/O performance reducing ...
Ernst L. Leiss, Yili Wang
CN
1998
81views more  CN 1998»
15 years 3 months ago
Improving the WWW: Caching or Multicast?
We consider two schemes for the distributionof Web documents. In the first scheme the sender repeatedly transmits the Web document into a multicast address, and receivers asynchr...
Pablo Rodriguez, Keith W. Ross, Ernst Biersack
« Prev « First page 1405 / 1627 Last » Next »