Sciweavers

10040 search results - page 1966 / 2008
» On Information Lifecycle Management
Sort
View
GROUP
2007
ACM
14 years 23 days ago
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
The tension between privacy and awareness has been a persistent difficulty in distributed environments that support opportunistic and informal interaction. For example, many aware...
Jeremy P. Birnholtz, Carl Gutwin, Kirstie Hawkey
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
14 years 22 days ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
COLCOM
2009
IEEE
14 years 21 days ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
AINA
2004
IEEE
14 years 19 days ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
BROADNETS
2004
IEEE
14 years 19 days ago
Capacity-Efficient Protection with Fast Recovery in Optically Transparent Mesh Networks
Survivability becomes increasingly critical in managing high-speed networks as data traffic continues to grow in both size and importance. In addition, the impact of failures is e...
Sun-il Kim, Steven S. Lumetta
« Prev « First page 1966 / 2008 Last » Next »