Sciweavers

10674 search results - page 1901 / 2135
» The Virtual Environment - Another Approach
Sort
View
AINA
2009
IEEE
15 years 10 months ago
Preference Ordering in Agenda Based Multi-issue Negotiation for Service Level Agreement
—This paper discusses multi-issue negotiation between agents such as providers and consumers in a group decision making environment. The outcome of such encounters depends on two...
Fahmida Abedin, Kuo-Ming Chao, Nick Godwin, Hisbel...
APSCC
2009
IEEE
15 years 10 months ago
Extended policies for automatic service composition in IMS
— Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in Next Generati...
Cuiting Huang, Noël Crespi
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 10 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
ACSAC
2002
IEEE
15 years 10 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
CLUSTER
2002
IEEE
15 years 10 months ago
Mixed Mode Matrix Multiplication
In modern clustering environments where the memory hierarchy has many layers (distributed memory, shared memory layer, cache,  ¡ ¢  ), an important question is how to fully u...
Meng-Shiou Wu, Srinivas Aluru, Ricky A. Kendall
« Prev « First page 1901 / 2135 Last » Next »