Sciweavers

1297 search results - page 215 / 260
» fews 2007
Sort
View
CN
2007
116views more  CN 2007»
14 years 9 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer
CONSTRAINTS
2007
100views more  CONSTRAINTS 2007»
14 years 9 months ago
Design of Financial CDO Squared Transactions Using Constraint Programming
We give an approximate and often extremely fast method of building a particular kind of portfolio in finance, here called a portfolio design (PD), with applications in the credit ...
Pierre Flener, Justin Pearson, Luis G. Reyna, Olof...
CORR
2007
Springer
114views Education» more  CORR 2007»
14 years 9 months ago
High Performance Direct Gravitational N-body Simulations on Graphics Processing Units
We present the results of gravitational direct N-body simulations using the commercial graphics processing units (GPU) NVIDIA Quadro FX1400 and GeForce 8800GTX, and compare the re...
Simon Portegies Zwart, Robert G. Belleman, Peter G...
EJIS
2007
139views more  EJIS 2007»
14 years 9 months ago
Applying TAM across cultures: the need for caution
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many differ...
Scott McCoy, Dennis F. Galletta, William R. King
JUCS
2006
225views more  JUCS 2006»
14 years 9 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke