Sciweavers

4455 search results - page 757 / 891
» The family and communication technologies
Sort
View
129
Voted
JCP
2008
120views more  JCP 2008»
15 years 24 days ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
65
Voted
JDCTA
2008
87views more  JDCTA 2008»
15 years 24 days ago
M-Brochure
Tourism industry is one of the important sources of income in many countries. The appropriate and quick submission of primary information such as address of hotels to the tourists...
Mohammad Shirali-Shahreza
116
Voted
JDCTA
2008
160views more  JDCTA 2008»
15 years 24 days ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
143
Voted
ISCA
2006
IEEE
123views Hardware» more  ISCA 2006»
15 years 24 days ago
A Gracefully Degrading and Energy-Efficient Modular Router Architecture for On-Chip Networks
Packet-based on-chip networks are increasingly being adopted in complex System-on-Chip (SoC) designs supporting numerous homogeneous and heterogeneous functional blocks. These Net...
Jongman Kim, Chrysostomos Nicopoulos, Dongkook Par...
102
Voted
JNW
2008
99views more  JNW 2008»
15 years 24 days ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...