Sciweavers

2658 search results - page 143 / 532
» Micro-communication Element System
Sort
View
ISTA
2004
15 years 6 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren
132
Voted
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
15 years 11 months ago
Virtual Experiential Marketing on Online Customer Intentions and Loyalty
Advances in information and web technologies have open numerous opportunities for online retailing. The pervasiveness of the Internet coupled with the keenness in competition amon...
Jashen Chen, Russell K. H. Ching, Margaret Meiling...
114
Voted
ICDM
2007
IEEE
95views Data Mining» more  ICDM 2007»
15 years 11 months ago
Incremental Quantization for Aging Data Streams
A growing number of applications have become reliant or can benefit from monitoring data streams. Data streams are potentially unbounded in size, hence, Data Stream Management Sy...
Fatih Altiparmak, David Chiu, Hakan Ferhatosmanogl...
ARITH
2003
IEEE
15 years 10 months ago
On Computing Addition Related Arithmetic Operations via Controlled Transport of Charge
In this paper we investigate the implementation of basic arithmetic functions, such as addition and multiplication, in Single Electron Tunneling (SET) technology. First, we descri...
Sorin Cotofana, Casper Lageweg, Stamatis Vassiliad...
RT
1999
Springer
15 years 9 months ago
Space-Time Hierarchical Radiosity
This paper presents a new hierarchical simulation algorithm allowing the calculation of radiosity solutions for time-dependent scenes where all motion is known a priori. Such solut...
Cyrille Damez, François X. Sillion