Sciweavers

3657 search results - page 61 / 732
» A Study of Practical Deduplication
Sort
View
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
14 years 4 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl
BROADNETS
2006
IEEE
14 years 4 months ago
Toward a More Practical Marking Scheme for IP Traceback
Probabilistic packet marking (PPM) has been studied as a promising approach to realize IP traceback. In this paper, we propose a new PPM approach that improves the current state o...
Chao Gong, Kamil Saraç
PERVASIVE
2005
Springer
14 years 3 months ago
Social Disclosure of Place: From Location Technology to Communication Practices
Communication of one’s location as part of a social discourse is common practice, and we use a variety of technologies to satisfy this need. This practice suggests a potentially ...
Ian E. Smith, Sunny Consolvo, Anthony LaMarca, Jef...
DATE
2002
IEEE
137views Hardware» more  DATE 2002»
14 years 3 months ago
Practical Instruction Set Design and Compiler Retargetability Using Static Resource Models
The design of application (-domain) specific instructionset processors (ASIPs), optimized for code size, has traditionally been accompanied by the necessity to program assembly, ...
Qin Zhao, Bart Mesman, Twan Basten
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 11 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol