Sciweavers

8655 search results - page 1587 / 1731
» Challenges for Trusted Computing
Sort
View
IDC
2009
Springer
14 years 7 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
IEEESCC
2009
IEEE
14 years 7 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...
89
Voted
CCGRID
2010
IEEE
14 years 7 months ago
Low-Cost Tuning of Two-Step Algorithms for Scheduling Mixed-Parallel Applications onto Homogeneous Clusters
Due to the strong increase of processing units available to the end user, expressing parallelism of an algorithm is a major challenge for many researchers. Parallel applications ar...
Sascha Hunold
ICCSA
2010
Springer
14 years 7 months ago
An Aspect-Oriented Approach for Mobile Embedded Software Modeling
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life incre...
Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma, Wong...
IEPOL
2010
130views more  IEPOL 2010»
14 years 7 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
« Prev « First page 1587 / 1731 Last » Next »