Sciweavers

2826 search results - page 431 / 566
» A resource-based analysis of IT sourcing
Sort
View
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 8 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
VTC
2008
IEEE
15 years 8 months ago
High Rate Two-Way Amplify-and-Forward Half-Duplex Relaying with OSTBC
—In this paper, we derive tight upper and lower bounds for the average sum rate of two-way amplify-andforward (AF) half-duplex relaying, which show that two-way AF half-duplex re...
Yang Han, See Ho Ting, Chin Keong Ho, Woon Hau Chi...
AH
2008
Springer
15 years 8 months ago
Re-assessing the Value of Adaptive Navigation Support in E-Learning Context
In a recent study, we discovered a new effect of adaptive navigation support in the context of E-learning: the ability to motivate student to work more with non-mandatory education...
Sergey A. Sosnovsky, Peter Brusilovsky, Danielle H...
86
Voted
DFT
2007
IEEE
105views VLSI» more  DFT 2007»
15 years 8 months ago
A Refined Electrical Model for Particle Strikes and its Impact on SEU Prediction
Decreasing feature sizes have led to an increased vulnerability of random logic to soft errors. A particle strike may cause a glitch or single event transient (SET) at the output ...
Sybille Hellebrand, Christian G. Zoellin, Hans-Joa...
108
Voted
FUZZIEEE
2007
IEEE
15 years 8 months ago
Using Orders of Magnitude and Nominal Variables to Construct Fuzzy Partitions
— The application of Qualitative Reasoning to Learning Algorithms can provide these models with the capability of automate common-sense and expert reasoning. Learning algorithms ...
Cati Olmo, Germán Sánchez, Francesc ...