Sciweavers

3056 search results - page 149 / 612
» Open Implementation Analysis and Design
Sort
View
132
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A cost-based analysis of overlay routing geometries
— In this paper, we propose a cost-based model to evaluate the resources that each node has to contribute for participating in an overlay network. Such a cost model allows to gau...
Nicolas Christin, John Chuang
HUMAN
2003
Springer
15 years 9 months ago
Analysis of User Utility Function in the Combined Cellular/WLAN Environments
Recent advances in wireless networking technologies enabled nomadic users connected to the Internet anywhere from the outdoor environments such as airport, hotel, subway station, o...
Jae-Hwan Kim, Young Yong Kim
DAMON
2006
Springer
15 years 7 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
CLEIEJ
2002
113views more  CLEIEJ 2002»
15 years 3 months ago
Analysis Patterns for GIS Data Schema Reuse on Urban Management Applications
An analysis pattern is any part of a requirement analysis specification that can be reused in the design of other information systems as well. Urban management systems (e.g.: Tax ...
Jugurta Lisboa Filho, Cirano Iochpe, Karla A. V. B...
145
Voted
DFT
1997
IEEE
141views VLSI» more  DFT 1997»
15 years 8 months ago
Analysis of a Hybrid Defect-Tolerance Scheme for High-Density Memory ICs
Recent increases in the density and size of memory ICs made it ne cessary to search for new defect tolerance techniques since the traditional methods are no longer e ective enough...
Israel Koren, Zahava Koren