Sciweavers

834 search results - page 98 / 167
» Quantifying and Measuring Anonymity
Sort
View
ICSEA
2007
IEEE
14 years 4 months ago
The Knowledge Based Software Process Improvement Program: A Rational Analysis
Knowledge management is the key area of focus in the present information technology scenario. It forms a basis to derive standards and models and steers organizations through an e...
K. Alagarsamy, S. Justus, K. Iyakutti
FCCM
2006
IEEE
144views VLSI» more  FCCM 2006»
14 years 4 months ago
Combining Instruction Coding and Scheduling to Optimize Energy in System-on-FPGA
In this paper, we investigate a combination of two techniques — instruction coding and instruction re-ordering — for optimizing energy in embedded processor control. We presen...
Robert G. Dimond, Oskar Mencer, Wayne Luk
ICNP
2006
IEEE
14 years 4 months ago
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
— The BitTorrent (BT) file sharing protocol is popular due to its scalability property and the incentive mechanism to reduce free-riding. However, in designing such P2P file sh...
Bin Fan, Dah-Ming Chiu, John C. S. Lui
ACMICEC
2006
ACM
148views ECommerce» more  ACMICEC 2006»
14 years 4 months ago
Web based information for product ranking in e-business: a fuzzy approach
In this paper we have introduced a methodology to rank the available products in the Internet market. These rankings are based on the customers’ own preferences and also on the ...
B. K. Mohanty, K. Passi
CONEXT
2006
ACM
14 years 4 months ago
Virtual networks under attack: disrupting internet coordinate systems
Internet coordinate-based systems are poised to become an important service to support overlay construction and topology-aware applications. Indeed, through network distance embed...
Mohamed Ali Kâafar, Laurent Mathy, Thierry T...