Sciweavers

7587 search results - page 1364 / 1518
» Network Analysis and Visualisation
Sort
View
DATE
2010
IEEE
166views Hardware» more  DATE 2010»
14 years 1 months ago
From transistors to MEMS: Throughput-aware power gating in CMOS circuits
—In this paper we study the effectiveness of two power gating methods – transistor switches and MEMS switches – in reducing the power consumption of a design with a certain t...
Michael B. Henry, Leyla Nazhandali
HT
2010
ACM
14 years 1 months ago
Discovery of information disseminators and receptors on online social media
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
Munmun De Choudhury
ACSAC
2002
IEEE
14 years 1 months ago
Security of Internet Location Management
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this locati...
Tuomas Aura, Michael Roe, Jari Arkko
ACSAC
2002
IEEE
14 years 1 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
14 years 1 months ago
Empirical Evidence of the Impacts of Electronic Commerce on Supply Chain Integration in the Telecommunication Equipment Industry
This paper presents an analysis of the impacts of electronic commerce on proactive firms in the connectivity equipment industry. Electronic commerce initiatives identified in the ...
Luc Cassivi, Louis A. Lefebvre, Pierre-Majorique L...
« Prev « First page 1364 / 1518 Last » Next »