Sciweavers

4923 search results - page 847 / 985
» Software Risk Management
Sort
View
IH
2001
Springer
14 years 1 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
NLDB
2001
Springer
14 years 1 months ago
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations
At Hewlett-Packard Laboratories we want to know how inexpensive it can be to endow mobile personal assistants with the ability to speak naturally with their users. To this end, we ...
Lewis G. Creary, Michael VanHilst
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
14 years 1 months ago
Value based Requirements Creation for Electronic Commerce Applications
Electronic commerce applications have special features compared to conventional information systems. First, because electronic commerce usually involves yet nonexisting business a...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
IPPS
2000
IEEE
14 years 1 months ago
Controlling Distributed Shared Memory Consistency from High Level Programming Languages
One of the keys for the success of parallel processing is the availability of high-level programming languages for on-the-shelf parallel architectures. Using explicit message passi...
Yvon Jégou
IPPS
2000
IEEE
14 years 1 months ago
Thread Migration and Load Balancing in Non-Dedicated Environments
Networks of workstations are fast becoming the standard environment for parallel applications. However, the use of “found” resources as a platform for tightly-coupled runtime ...
Kritchalach Thitikamol, Peter J. Keleher