Sciweavers

3404 search results - page 536 / 681
» C Programming Tutorial
Sort
View
HICSS
2003
IEEE
180views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Case Study of Integrating Knowledge Management into the Supply Chain Management Process
To achieve success at supply chain management (SCM), an organization must possess--and share-knowledge about the different facets of the supply chain. Lack of information sharing ...
Nancy C. Shaw, Mary J. Meixell, Francis D. Tuggle
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
15 years 3 months ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
IPPS
2003
IEEE
15 years 3 months ago
SPMD Image Processing on Beowulf Clusters: Directives and Libraries
Most image processing algorithms can be parallelized by splitting parallel loops and by using very few communication patterns. Code parallelization using MPI still involves much p...
Paulo F. Oliveira, J. M. Hans du Buf
IRI
2003
IEEE
15 years 3 months ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 3 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...