Sciweavers

8655 search results - page 1587 / 1731
» Challenges for Trusted Computing
Sort
View
177
Voted
IDC
2009
Springer
15 years 1 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
118
Voted
IEEESCC
2009
IEEE
15 years 1 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...
137
Voted
CCGRID
2010
IEEE
15 years 1 months ago
Low-Cost Tuning of Two-Step Algorithms for Scheduling Mixed-Parallel Applications onto Homogeneous Clusters
Due to the strong increase of processing units available to the end user, expressing parallelism of an algorithm is a major challenge for many researchers. Parallel applications ar...
Sascha Hunold
141
Voted
ICCSA
2010
Springer
15 years 1 months ago
An Aspect-Oriented Approach for Mobile Embedded Software Modeling
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life incre...
Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma, Wong...
114
Voted
IEPOL
2010
130views more  IEPOL 2010»
15 years 29 days ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
« Prev « First page 1587 / 1731 Last » Next »