Sciweavers

854 search results - page 78 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
DIS
2005
Springer
15 years 6 months ago
The Arrowsmith Project: 2005 Status Report
In the 1980s, Don Swanson proposed the concept of “undiscovered public knowledge,” and published several examples in which two disparate literatures (i.e., sets of articles hav...
Neil R. Smalheiser
124
Voted
GLOBECOM
2009
IEEE
14 years 10 months ago
Implementation and Benchmarking of Hardware Accelerators for Ciphering in LTE Terminals
Abstract--In this paper we investigate hardware implementations of ciphering algorithms, SNOW 3G and the Advanced Encryption Standard (AES), for the acceleration of the protocol st...
Sebastian Hessel, David Szczesny, Nils Lohmann, At...
96
Voted
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 6 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
83
Voted
TCOM
2008
98views more  TCOM 2008»
15 years 21 days ago
Performance evaluation of multi-hop CSMA/CA networks in fading environments
The performance of multi-hop CSMA/CA networks has in most cases been evaluated via simulations, or analytically using a perfect collision channel model. Using such methods, one ca...
Duong A. Hoang, Ronald A. Iltis
MM
1997
ACM
131views Multimedia» more  MM 1997»
15 years 5 months ago
Continuous Display Using Heterogeneous Disk-Subsystems
A number of recent technological trends have made data intensive applications such as continuous media (audio and video) servers a reality. These servers store and retrieve a larg...
Roger Zimmermann, Shahram Ghandeharizadeh