Sciweavers

329 search results - page 45 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
MEMBRANE
2009
Springer
14 years 2 months ago
Conformon P Systems and Topology of Information Flow
would be an abstract answer (because it would not immediately link a formal model with the biological reality that inspired it or with possible implementations) from the other hand...
Pierluigi Frisco
DSRT
2008
IEEE
14 years 2 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 2 months ago
Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based Approach
This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (...
Saggi Nevo, Michael R. Wade
LCN
2008
IEEE
14 years 2 months ago
TCP mechanisms for improving the user experience for time-dependent thin-stream applications
—A wide range of Internet-based services that use reliable transport protocols display what we call thin-stream properties. This means that the application sends data with such a...
Andreas Petlund, Kristian Evensen, Carsten Griwodz...
WISE
2008
Springer
14 years 2 months ago
A Web-Based Automated System for Industry and Occupation Coding
This paper describes Automated Industry and Occupation Coding System (AIOCS). The main function of the system is to classify natural language responses to survey questionnaires int...
Yuchul Jung, Jihee Yoo, Sung-Hyon Myaeng, Dong-Che...