Sciweavers

84 search results - page 16 / 17
» Finding and transferring policies using stored behaviors
Sort
View
PE
2002
Springer
150views Optimization» more  PE 2002»
13 years 5 months ago
Delimiting the range of effectiveness of scalable on-demand streaming
Previous analyses of scalable streaming protocols for delivery of stored multimedia have largely focused on how the server bandwidth required for full-file delivery scales as the ...
Haonan Tan, Derek L. Eager, Mary K. Vernon
CGO
2008
IEEE
13 years 11 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
JKM
2007
126views more  JKM 2007»
13 years 5 months ago
The moderating role of human capital management practices on employee capabilities
Purpose – The purpose of this paper is to suggest and empirically test a model that explains employee capabilities from the knowledge-based perspective. In this model, human cap...
Nick Bontis, Alexander Serenko
DIMVA
2004
13 years 6 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
HICSS
2009
IEEE
189views Biometrics» more  HICSS 2009»
14 years 4 days ago
Predicting Change: A Study of the Value Frequency Model for Change of Practice
Information systems (IS) researchers have made considerable progress on defining and formalizing structured methods to support collaborative development of information systems. Co...
Robert O. Briggs, John D. Murphy, Thomas F. Carlis...