Sciweavers

3885 search results - page 756 / 777
» Transformations for Write-All-with-Collision Model
Sort
View
CITA
2003
IEEE
14 years 28 days ago
Internet Diffusion and E-Business Opportunities Amongst Malaysian Travel Agencies
This paper reports an investigation into the adoption of the Internet amongst Malaysian travel agencies as a means of exploring the likely future potential growth of e-business wi...
Raja Mazhatul Yasmin Suraya
IV
2003
IEEE
200views Visualization» more  IV 2003»
14 years 27 days ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
NDSS
2003
IEEE
14 years 27 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
RTSS
2003
IEEE
14 years 27 days ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue
SCAM
2003
IEEE
14 years 27 days ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef