Sciweavers

1027 search results - page 179 / 206
» Opening Up The Enterprise
Sort
View
CCS
2004
ACM
15 years 5 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
NOSSDAV
2004
Springer
15 years 5 months ago
Client-centered energy savings for concurrent HTTP connections
—In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a WNIC is to transit...
Haijin Yan, Rupa Krishnan, Scott A. Watterson, Dav...
ICRA
2003
IEEE
178views Robotics» more  ICRA 2003»
15 years 5 months ago
Design of six sigma supply chains
Abstract—Variability reduction and business process synchronization are acknowledged as key to achieving sharp and timely deliveries in supply chain networks. In this paper, we i...
Dinesh Garg, Yadati Narahari, Nukala Viswanadham
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
15 years 5 months ago
WaveScalar
Silicon technology will continue to provide an exponential increase in the availability of raw transistors. Effectively translating this resource into application performance, how...
Steven Swanson, Ken Michelson, Andrew Schwerin, Ma...
VISUALIZATION
2003
IEEE
15 years 5 months ago
Using Deformations for Browsing Volumetric Data
Many traditional techniques for “looking inside” volumetric data involve removing portions of the data, for example using various cutting tools, to reveal the interior. This a...
Michael J. McGuffin, Liviu Tancau, Ravin Balakrish...