Sciweavers

8331 search results - page 1583 / 1667
» Data Aggregation Sets in Adaptive Data Model
Sort
View
139
Voted
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 10 months ago
Are There Contagion Effects in the Diffusion of IT Outsourcing?
Growth in the IT outsourcing industry during the past ten years has been exceptional. In this study, we theorize about and analyze the growth patterns of IT outsourcing at the leve...
Kunsoo Han, Robert J. Kauffman, Arti Mann, Barrie ...
ASPDAC
2009
ACM
212views Hardware» more  ASPDAC 2009»
15 years 10 months ago
Timing analysis and optimization implications of bimodal CD distribution in double patterning lithography
Abstract— Double patterning lithography (DPL) is in current production for memory products, and is widely viewed as inevitable for logic products at the 32nm node. DPL decomposes...
Kwangok Jeong, Andrew B. Kahng
ICCCN
2008
IEEE
15 years 10 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
123
Voted
ISPDC
2008
IEEE
15 years 10 months ago
Algorithms for Network Topology Discovery using End-to-End Measurements
Identifying and inferring performances of a network topology is a well known problem. Achieving this by using only end-to-end measurements at the application level is a method kno...
Laurent Bobelin, Traian Muntean
129
Voted
TIME
2008
IEEE
15 years 10 months ago
Representing Public Transport Schedules as Repeating Trips
The movement in public transport networks is organized according to schedules. The real-world schedules are specified by a set of periodic rules and a number of irregularities fr...
Romans Kasperovics, Michael H. Böhlen, Johann...
« Prev « First page 1583 / 1667 Last » Next »