Sciweavers

14824 search results - page 2569 / 2965
» Security - Introduction
Sort
View
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
15 years 9 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
GLVLSI
2005
IEEE
85views VLSI» more  GLVLSI 2005»
15 years 9 months ago
VLSI CAD tool protection by birthmarking design solutions
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Lin Yuan, Gang Qu, Ankur Srivastava
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 9 months ago
Identifying Facilitators and Inhibitors of Market Structure Change: A Hybrid Theory of Unbiased Electronic Markets
The electronic markets hypothesis (EMH) in the information systems (IS) literature suggests that information technology (IT) will reduce coordination costs across firms, leading t...
Nelson F. Granados, Alok Gupta, Robert J. Kauffman
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
15 years 9 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 9 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
« Prev « First page 2569 / 2965 Last » Next »