Sciweavers

575 search results - page 67 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
DAC
2006
ACM
14 years 1 months ago
Modeling and analysis of circuit performance of ballistic CNFET
With the advent of carbon nanotube technology, evaluating circuit and system performance using these devices is becoming extremely important. In this paper, we propose a quasi-ana...
Bipul C. Paul, Shinobu Fujita, Masaki Okajima, Tho...
IMC
2010
ACM
13 years 5 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
IJESMA
2010
136views more  IJESMA 2010»
13 years 5 months ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....
CHI
2008
ACM
14 years 8 months ago
Lifting the veil: improving accountability and social transparency in Wikipedia with wikidashboard
Wikis are collaborative systems in which virtually anyone can edit anything. Although wikis have become highly popular in many domains, their mutable nature often leads them to be...
Bongwon Suh, Ed H. Chi, Aniket Kittur, Bryan A. Pe...
GECCO
2008
Springer
114views Optimization» more  GECCO 2008»
13 years 8 months ago
Strategic positioning in tactical scenario planning
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for op...
James M. Whitacre, Hussein A. Abbass, Ruhul A. Sar...