Sciweavers

Share
HICSS
2003
IEEE
150views Biometrics» more  HICSS 2003»
8 years 10 months ago
Adaptive Location Management Strategy Combining Distance-Based Update and Sectional Paging Techniques
In this paper, we develop a new adaptive scheme in which an optimal distance-based update threshold is selected not only as a function of the call-to-mobility ratio, but also as a...
Tracy Tung, Abbas Jamalipour
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
8 years 10 months ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
8 years 10 months ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
HICSS
2003
IEEE
89views Biometrics» more  HICSS 2003»
8 years 10 months ago
A Two-Cell-Lookahead Call Admission and Handoff Management Scheme for Multimedia LEO Satellite Networks
The main contribution of this work is to propose a novel call admission and handoff management scheme for LEO satellite networks. A key ingredient in our scheme is a companion pre...
Petia Todorova, Stephan Olariu, Hoang Nam Nguyen
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
8 years 10 months ago
Quality-of-Service-Oriented Media Access Control for Advanced Mobile Multimedia Satellite Systems
Satellite networks offer a number of desirable characteristics including wide area coverage, unique broadcast capabilities, the ability to communicate with hand-held devices, and ...
Petia Todorova, Alexander Markhasin
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
8 years 10 months ago
Attack Recognition for System Survivability: A Low-level Approach
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognitionâ...
Carol Taylor, Jim Alves-Foss
HICSS
2003
IEEE
152views Biometrics» more  HICSS 2003»
8 years 10 months ago
Advanced Technology and Knowledge Transfer
This paper reports on a specific food and agribusiness industry project, employing new technological capabilities to better transfer expert knowledge. Knowledge transfer and techn...
Geetanjali Tandon, Steven T. Sonka
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
8 years 10 months ago
Using Narrative Inquiry in a Study of Information Systems Professionals
The research reported in this paper employed Narrative Inquiry in an innovative way in a study of the key factors that influence the career paths of information systems (IS) profe...
Felix B. Tan, M. Gordon Hunter
HICSS
2003
IEEE
81views Biometrics» more  HICSS 2003»
8 years 10 months ago
Ex Ante and Ex Post Designs for Electric Market Mitigation: Past and Present Experience and Lessons from California
Restructuring in electric power sectors took a significant step backward in the summer of 2000 when wholesale and retail markets in California experienced staggering price increas...
Richard Tabors, Judith B. Cardell
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
8 years 10 months ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...
books