Sciweavers

390 search results - page 59 / 78
» The Factors that Affect the Implementation Success of IS
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 3 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
VTC
2008
IEEE
120views Communications» more  VTC 2008»
14 years 3 months ago
Boosting Video Capacity of IEEE 802.11n through Multiple Receiver Frame Aggregation
—The technology based on the IEEE 802.11 standard has been hugely successful, and is evolving towards even higher speeds and richer features. In particular, the 802.11n amendment...
Kyungsoo Lee, Sangki Yun, Hyogon Kim
KSEM
2007
Springer
14 years 2 months ago
Knowledge Engineering Technique for Cluster Development
After the concept of industry cluster was tangibly applied in many countries, SMEs trended to link to each other to maintain their competitiveness in the market. The major key succ...
Pradorn Sureephong, Nopasit Chakpitak, Yacine Ouzr...
DEXAW
2006
IEEE
153views Database» more  DEXAW 2006»
14 years 2 months ago
Capturing and Using the Operational Semantics of Large Distributed Systems: Sharing Common Application Requirements in Virtual O
Organisations may wish to use a standards-defined distributed system in a global sense but also have a requirement for non-standard local behaviour. This reflects the production...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
ASPDAC
2006
ACM
133views Hardware» more  ASPDAC 2006»
14 years 2 months ago
High-level architecture exploration for MPEG4 encoder with custom parameters
Abstract - this paper proposes the use of a high-level architecture exploration method for different MPEG4 video encoders using different customization parameters. The targeted arc...
Marius Bonaciu, Aimen Bouchhima, Mohamed-Wassim Yo...