Sciweavers

326 search results - page 61 / 66
» Closing the Gap
Sort
View
JKM
2007
123views more  JKM 2007»
13 years 10 months ago
Knowledge sharing: moving away from the obsession with best practices
Purpose – How companies can become better at knowing what they know, and share what they know have in recent years become dominant fields of research within knowledge managemen...
Peter Holdt Christensen
INFOCOM
2011
IEEE
13 years 2 months ago
General capacity scaling of wireless networks
—We study the general scaling laws of the capacity for random wireless networks under the generalized physical model. The generality of this work is embodied in three dimensions ...
Cheng Wang, Changjun Jiang, Xiang-Yang Li, ShaoJie...
INFOCOM
2011
IEEE
13 years 2 months ago
Sharing multiple messages over mobile networks
—Information dissemination in a large network is typically achieved when each user shares its own information or resources with each other user. Consider n users randomly located...
Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews
JUCS
2010
114views more  JUCS 2010»
13 years 5 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
ISCA
2007
IEEE
145views Hardware» more  ISCA 2007»
14 years 5 months ago
Mechanisms for store-wait-free multiprocessors
Store misses cause significant delays in shared-memory multiprocessors because of limited store buffering and ordering constraints required for proper synchronization. Today, prog...
Thomas F. Wenisch, Anastassia Ailamaki, Babak Fals...