Sciweavers

1737 search results - page 329 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
JTAER
2007
104views more  JTAER 2007»
13 years 9 months ago
Key Drivers of Mobile Commerce Adoption. An Exploratory Study of Spanish Mobile Users
Despite dramatic differences between non-store shoppers were discovered, very limited research has been conducted to examine them. This paper analyses the background of M-commerce...
Enrique Bigné, Carla Ruiz-Mafé, Silv...
CODES
2005
IEEE
14 years 2 months ago
High-level synthesis for large bit-width multipliers on FPGAs: a case study
In this paper, we present the analysis, design and implementation of an estimator to realize large bit width unsigned integer multiplier units. Larger multiplier units are require...
Gang Quan, James P. Davis, Siddhaveerasharan Devar...
BMCBI
2004
114views more  BMCBI 2004»
13 years 9 months ago
Extending the mutual information measure to rank inferred literature relationships
Background: Within the peer-reviewed literature, associations between two things are not always recognized until commonalities between them become apparent. These commonalities ca...
Jonathan D. Wren
SDM
2009
SIAM
192views Data Mining» more  SDM 2009»
14 years 6 months ago
Mining Cohesive Patterns from Graphs with Feature Vectors.
The increasing availability of network data is creating a great potential for knowledge discovery from graph data. In many applications, feature vectors are given in addition to g...
Arash Rafiey, Flavia Moser, Martin Ester, Recep Co...
CF
2007
ACM
14 years 1 months ago
Reconfigurable hybrid interconnection for static and dynamic scientific applications
As we enter the era of petascale computing, system architects must plan for machines composed of tens or even hundreds of thousands of processors. Although fully connected network...
Shoaib Kamil, Ali Pinar, Daniel Gunter, Michael Li...