Sciweavers

4962 search results - page 955 / 993
» Connectivity in Sub-Poisson Networks
Sort
View
EATIS
2007
ACM
15 years 5 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
ECTEL
2009
Springer
15 years 5 months ago
Context-Aware Combination of Adapted User Profiles for Interchange of Knowledge between Peers
Abstract. This paper presents a system that connects students with complementary profiles, so they can interchange knowledge and help each other. The profile of the students is bui...
Sergio Gutiérrez Santos, Mario Muñoz...
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
15 years 5 months ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
135
Voted
ACSAC
2006
IEEE
15 years 5 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
ANSS
2004
IEEE
15 years 5 months ago
Adaptive Energy Conservation Model using Dynamic Caching for Wireless Devices
One important issue that has to be taken into account in wireless devices is the energy conservation. Every infrastructureless network must be adaptively self configured particula...
Constandinos X. Mavromoustakis, Helen D. Karatza