Sciweavers

43190 search results - page 8579 / 8638
» Can Development Be Designed
Sort
View
JPDC
2006
141views more  JPDC 2006»
13 years 10 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
JSS
2006
122views more  JSS 2006»
13 years 10 months ago
Efficient index caching for data dissemination in mobile computing environments
Due to the limited power supply of mobile devices, much research has been done on reducing the power consumption of mobile devices in mobile computing environments. Since supporti...
Jen-Jou Hung, Yungho Leu
MONET
2008
77views more  MONET 2008»
13 years 10 months ago
On Relay Node Placement and Assignment for Two-tiered Wireless Networks
Wireless networks that operate on batteries are imposed with energy constraints and long distance communications between nodes are not desirable. Implementing Relay Nodes (RNs) can...
Wenxuan Guo, Xin-Ming Huang, Wenjing Lou, Cao Lian...
EOR
2007
85views more  EOR 2007»
13 years 10 months ago
Modeling and analysis of a supply-assembly-store chain
We consider a supply–assembly–store chain with produce-to-stock strategy, which comprises a set of component suppliers, a mixed-model assembly line with a constantly moving co...
Xiaobo Zhao, Deju Xu, Hanqin Zhang, Qi-Ming He
KAIS
2006
172views more  KAIS 2006»
13 years 10 months ago
CoMMA: a framework for integrated multimedia mining using multi-relational associations
Generating captions or annotations automatically for still images is a challenging task. Traditionally, techniques involving higher-level (semantic) object detection and complex f...
Ankur Teredesai, Muhammad A. Ahmad, Juveria Kanodi...
« Prev « First page 8579 / 8638 Last » Next »