Sciweavers

507 search results - page 51 / 102
» Defensive Marketing Strategies
Sort
View
CASES
2006
ACM
15 years 3 months ago
Code transformation strategies for extensible embedded processors
Embedded application requirements, including high performance, low power consumption and fast time to market, are uncommon in the broader domain of general purpose applications. I...
Paolo Bonzini, Laura Pozzi
ISECS
2008
IEEE
15 years 4 months ago
A Regression-based Coordination for Concurrent Negotiation
Given that resource providers and consumers may have different requirements and performance goals, concurrent negotiation is considered in this work to successfully obtain commitm...
Benyun Shi, Kwang Mong Sim
AXMEDIS
2006
IEEE
238views Multimedia» more  AXMEDIS 2006»
15 years 3 months ago
The Use of Incentive Mechanisms in Multi-Channel Mobile Music Distribution
The music industry is planning to perform a significant shift toward the digital world by partnering cellphone network operators to build a mobile music market. In this paper we ...
Marco Furini, Manuela Montangero
ISPW
2006
IEEE
15 years 3 months ago
Tailor the Value-Based Software Quality Achievement Process to Project Business Cases
This paper proposes a risk-based process strategy decision-making approach. To improve the flexibility in applying the Value-Based Software Quality Achievement (VBSQA) process fram...
LiGuo Huang, Hao Hu, JiDong Ge, Barry W. Boehm, Ji...
CSREAESA
2008
14 years 11 months ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra