Sciweavers

2165 search results - page 94 / 433
» cases 2005
Sort
View
111
Voted
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
15 years 9 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
99
Voted
DFT
2005
IEEE
103views VLSI» more  DFT 2005»
15 years 9 months ago
Methodologies and Algorithms for Testing Switch-Based NoC Interconnects
In this paper, we present two novel methodologies for testing the interconnect fabrics of network-on-chip (NoC) based chips. Both use the concept of recursive testing, with differ...
Cristian Grecu, Partha Pratim Pande, Baosheng Wang...
140
Voted
GRC
2005
IEEE
15 years 9 months ago
Visualization of protein-protein interaction network for knowledge discovery
A new visualization tool, called "Visual Concept Explorer (VCE)", was developed to visualize concept relationships in bio-medical literatura VCE integrates Pathfinder Net...
Weizhong Zhu, Xia Lin, Xiaohua Hu, Bahrad A. Sokha...
HICSS
2005
IEEE
107views Biometrics» more  HICSS 2005»
15 years 9 months ago
Beyond Personal Webpublishing: An Exploratory Study of Conversational Blogging Practices
Although initially developed as low-threshold tools to publish on-line, weblogs increasingly appear to facilitate conversations. The objective of this study is to identify practic...
Lilia Efimova, Aldo de Moor
HICSS
2005
IEEE
128views Biometrics» more  HICSS 2005»
15 years 9 months ago
How to Overcome the Knowledge Paradox: Activate Knowledge Identity, Not Just Organize Information
A paradox appears to thwart traditional knowledge sharing efforts in organizations: the greater the benefit of a piece of knowledge to an organization the less likely that it will...
Sajda Qureshi, Peter Keen