We studied 52 field examples interaction breakdown in information technology project virtual teams and actions leaders took to fix it using information and communication technolog...
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
The future of mobile telephony is expected to rely on mobile services and the use of mobile services will be an integral part of the revenues to be generated by third generation m...
A significant fraction of the total power in highly synchronous systems is dissipated over clock networks. Hence, low-power clocking schemes would be promising approaches for futu...
Matthew Cooke, Hamid Mahmoodi-Meimand, Kaushik Roy