Sciweavers

8468 search results - page 1393 / 1694
» The Technology of Data Stashing
Sort
View
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
15 years 4 months ago
MobCon: A Generative Middleware Framework for Java Mobile Applications
While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
Vasian Cepa, Mira Mezini
HICSS
2005
IEEE
130views Biometrics» more  HICSS 2005»
15 years 4 months ago
Knowledge Flow in Interdisciplinary Teams
Knowledge flow in interdisciplinary teams has become of particular interest as research and alliances cross traditional disciplinary boundaries, and as computing is applied in any...
Caroline Haythornthwaite
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 4 months ago
Survey of Strategic Alignment Impacts on Organizational Performance in International European Companies
act The strategic use of technology based information systems (IS/IT) is a fundamental issue for every business. This is particularly true in the case of firms that engage in inter...
Hajer Kefi, Michel Kalika
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 4 months ago
Evaluating PACS Success: A Multidimensional Model
A picture archiving and communications system (PACS) is an integrated workflow system for managing images and related data which is designed to streamline operations throughout th...
Guy Paré, David Aubry, Luigi Lepanto, Claud...
HOTI
2005
IEEE
15 years 4 months ago
Challenges in Building a Flat-Bandwidth Memory Hierarchy for a Large-Scale Computer with Proximity Communication
Memory systems for conventional large-scale computers provide only limited bytes/s of data bandwidth when compared to their flop/s of instruction execution rate. The resulting bo...
Robert J. Drost, Craig Forrest, Bruce Guenin, Ron ...
« Prev « First page 1393 / 1694 Last » Next »