Sciweavers

1282 search results - page 118 / 257
» Sharing knowledge
Sort
View
130
Voted
ETRICS
2006
15 years 6 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
122
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Power Management for Cognitive Radio Platforms
This paper discusses how the cognitive radio concept can be extended to allow the system not only to manage shared resources such as spectrum, but to use this knowledge to optimize...
Amin Khajeh, Shih-Yang Cheng, Ahmed M. Eltawil, Fa...
94
Voted
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
15 years 9 months ago
Understanding CIO Role Effectiveness: The Antecedents and Consequents
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
Daniel Q. Chen, David S. Preston
84
Voted
IJEH
2006
82views more  IJEH 2006»
15 years 2 months ago
Healthcare and technology: the doctrine of networkcentric healthcare
: Worldwide costs and the disparity between healthcare in the Western world and the developing countries increase exponentially. Increased involvement of ICT allows, in similarity ...
Dag von Lubitz, Nilmini Wickramasinghe
127
Voted
INFOCOM
2002
IEEE
15 years 7 months ago
Routing Restorable Bandwidth Guaranteed Connections using Maximum 2-Route Flows
Abstract—Routing with service restorability is of much importance in Multi-Protocol Label Switched (MPLS) networks, and is a necessity in optical networks. For restoration, each ...
Koushik Kar, Murali S. Kodialam, T. V. Lakshman