Sciweavers

1709 search results - page 333 / 342
» networks 2000
Sort
View
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 1 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
ASPDAC
2000
ACM
154views Hardware» more  ASPDAC 2000»
14 years 1 months ago
Dynamic weighting Monte Carlo for constrained floorplan designs in mixed signal application
Simulated annealing has been one of the most popular stochastic optimization methods used in the VLSI CAD field in the past two decades for handling NP-hard optimization problems...
Jason Cong, Tianming Kong, Faming Liang, Jun S. Li...
HT
2000
ACM
14 years 1 months ago
Reusable hypertext structures for distance and JIT learning
Software components for distance and just-in-time (JIT) learning are an increasingly common method of encouraging reuse and facilitating the development process[58], but no analog...
Anne Morgan Spalter, Rosemary Michelle Simpson
MM
2000
ACM
91views Multimedia» more  MM 2000»
14 years 1 months ago
A prediction system for multimedia pre-fetching in Internet
The rapid development of Internet has resulted in more and more multimedia in Web content. However, due to the limitation in the bandwidth and huge size of the multimedia data, us...
Zhong Su, Qiang Yang, HongJiang Zhang
SAC
2000
ACM
14 years 1 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi