Sciweavers

2609 search results - page 348 / 522
» Models for Global Constraint Applications
Sort
View
DAC
2008
ACM
16 years 5 months ago
Energy-optimal software partitioning in heterogeneous multiprocessor embedded systems
Embedded systems with heterogeneous processors extend the energy/timing trade-off flexibility and provide the opportunity to fine tune resource utilization for particular applicat...
Michel Goraczko, Jie Liu, Dimitrios Lymberopoulos,...
EJIS
2007
139views more  EJIS 2007»
15 years 4 months ago
Applying TAM across cultures: the need for caution
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many differ...
Scott McCoy, Dennis F. Galletta, William R. King
145
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
ICSE
2004
IEEE-ACM
16 years 4 months ago
A Hybrid Architectural Style for Distributed Parallel Processing of Generic Data Streams
Immersive, interactive applications grouped under the concept of Immersipresence require on-line processing and mixing of multimedia data streams and structures. One critical issu...
Alexandre R. J. François
MOBISYS
2003
ACM
16 years 3 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald