Sciweavers

8655 search results - page 1332 / 1731
» Challenges for Trusted Computing
Sort
View
WABI
2005
Springer
143views Bioinformatics» more  WABI 2005»
15 years 9 months ago
A Faster Algorithm for Detecting Network Motifs
Motifs in a network are small connected subnetworks that occur in significantly higher frequencies than in random networks. They have recently gathered much attention as a useful ...
Sebastian Wernicke
ACMICEC
2004
ACM
161views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
The 2003 Supply Chain Management Trading Agent Competition
Supply Chain Management deals with the planning and coordination of bidding, production and procurement activities across the multiple organizations involved in the delivery of on...
Raghu Arunachalam, Norman M. Sadeh
CASES
2004
ACM
15 years 9 months ago
A post-compiler approach to scratchpad mapping of code
ScratchPad Memories (SPMs) are commonly used in embedded systems because they are more energy-efficient than caches and enable tighter application control on the memory hierarchy...
Federico Angiolini, Francesco Menichelli, Alberto ...
CSCW
2004
ACM
15 years 9 months ago
Collaborating around collections: informing the continued development of photoware
This paper explores the embodied interactional ways in which people naturally collaborate around and share collections of photographs. We employ ethnographic studies of paper-base...
Andy Crabtree, Tom Rodden, John A. Mariani
DIALM
2004
ACM
165views Algorithms» more  DIALM 2004»
15 years 9 months ago
LLS: a locality aware location service for mobile ad hoc networks
Coping with mobility and dynamism is one of the biggest challenges in ad hoc networks. An essential requirement for such networks is a service that can establish communication ses...
Ittai Abraham, Danny Dolev, Dahlia Malkhi
« Prev « First page 1332 / 1731 Last » Next »