Sciweavers

12 search results - page 2 / 3
» Detecting h-index manipulation through self-citation analysi...
Sort
View
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 4 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
TWC
2008
150views more  TWC 2008»
13 years 4 months ago
Design and analysis of post-coded OFDM systems
This paper discusses the design and analysis of post coded OFDM (PC-OFDM) systems. Coded or precoded OFDM systems are generally employed to overcome the symbol recovery problem in...
S. F. A. Shah, Ahmed H. Tewfik
IAT
2006
IEEE
13 years 11 months ago
A Labeled Graph Approach to Analyze Organizational Performance
Determining the performance of an organization is a must for both human and multi-agent organizations. The performance analysis enables organizations to uncover unexpected propert...
Mark Hoogendoorn, Jan Treur, Pinar Yolum
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
13 years 11 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
PEPM
2007
ACM
13 years 11 months ago
Behavioral similarity matching using concrete source code templates in logic queries
Program query languages and pattern-detection techniques are an essential part of program analysis and manipulation systems. Queries and patterns permit the identification of the...
Coen De Roover, Theo D'Hondt, Johan Brichau, Carlo...