Sciweavers

18697 search results - page 3689 / 3740
» Systemic Security Management
Sort
View
AINA
2009
IEEE
15 years 9 months ago
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks
Nowadays more and more devices of daily life are connected to each other and are integrated into massively distributed networks of embedded devices. These devices range from consu...
Christian Buckl, Stephan Sommer, Andreas Scholz, A...
ISCA
2010
IEEE
210views Hardware» more  ISCA 2010»
15 years 9 months ago
An intra-chip free-space optical interconnect
Continued device scaling enables microprocessors and other systems-on-chip (SoCs) to increase their performance, functionality, and hence, complexity. Simultaneously, relentless s...
Jing Xue, Alok Garg, Berkehan Ciftcioglu, Jianyun ...
128
Voted
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
15 years 9 months ago
Popularity-Guided Top-k Extraction of Entity Attributes
Recent progress in information extraction technology has enabled a vast array of applications that rely on structured data that is embedded in natural-language text. In particular...
Matthew Solomon, Cong Yu, Luis Gravano
APSEC
2002
IEEE
15 years 9 months ago
iBistro: A Learning Environment for Knowledge Construction in Distributed Software Engineering Courses
We have taught several distributed software engineering project courses with students and real clients [4]. During these projects, students in Pittsburgh and Munich, Germany colla...
Andreas Braun, Allen H. Dutoit, Andreas Harrer, Be...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 9 months ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...
« Prev « First page 3689 / 3740 Last » Next »