Sciweavers

592 search results - page 71 / 119
» Search-As-You-Type: Opportunities and Challenges
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 29 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
SIGUCCS
2003
ACM
14 years 29 days ago
A simple web content management tool as the solution to a web site redesign
Before embarking upon a large web site project, whether creating a new site or just redesigning one, it is generally accepted practice not to begin work until all the problem spec...
David Thomas Dudek, Heidi A. Wieczorek
LCTRTS
2010
Springer
13 years 5 months ago
Compiler directed network-on-chip reliability enhancement for chip multiprocessors
Chip multiprocessors (CMPs) are expected to be the building blocks for future computer systems. While architecting these emerging CMPs is a challenging problem on its own, program...
Ozcan Ozturk, Mahmut T. Kandemir, Mary Jane Irwin,...
TMC
2011
149views more  TMC 2011»
13 years 2 months ago
Context-Based Network Estimation for Energy-Efficient Ubiquitous Wireless Connectivity
— Context information brings new opportunities for efficient and effective system resource management of mobile devices. In this work we focus on the use of context information t...
Ahmad Rahmati, Lin Zhong
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 2 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy