The academic and professional literature addressing business process reengineering points at inter-task information flow delays (handoffs) as a major source of processing errors a...
Rajiv M. Dewan, Abraham Seidmann, Zhiping D. Walte...
Online social networking sites like Orkut, YouTube, and Flickr are among the most popular sites on the Internet. Users of these sites form a social network, which provides a power...
Alan Mislove, Massimiliano Marcon, P. Krishna Gumm...
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Applications need to become more concurrent to take advantage of the increased computational power provided by chip level multiprocessing. Programmers have traditionally managed t...
Bratin Saha, Ali-Reza Adl-Tabatabai, Richard L. Hu...
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...