Sciweavers

729 search results - page 44 / 146
» Supporting Use-Case Reviews
Sort
View
98
Voted
EDBTW
2010
Springer
15 years 7 months ago
Analysis of social networking privacy policies
As the use of social networks becomes more widespread and commonplace, users are beginning to question how their privacy is protected by social networks. In this paper, we review ...
Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Ba...
94
Voted
DATE
2009
IEEE
88views Hardware» more  DATE 2009»
15 years 7 months ago
Multi-core for mobile phones
—High-end mobile phones support multiple radio standards and a rich suite of applications, which involves advanced radio, audio, video, and graphics processing. The overall digit...
C. H. van Berkel
SAGA
2009
Springer
15 years 7 months ago
Scenario Reduction Techniques in Stochastic Programming
Stochastic programming problems appear as mathematical models for optimization problems under stochastic uncertainty. Most computational approaches for solving such models are base...
Werner Römisch
89
Voted
ICMB
2007
IEEE
136views Business» more  ICMB 2007»
15 years 6 months ago
The Emergence of the Mobile Enterprise: A Value-Driven Perspective
The mobile enterprise is an emerging organizational form that has resulted in a paradigm shift of how business is done. However, only little theoretical work has been done to expl...
Rahul C. Basole
79
Voted
FOSAD
2007
Springer
15 years 6 months ago
Trusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
Eimear Gallery, Chris J. Mitchell