Sciweavers

1733 search results - page 10 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
104
Voted
ITIIS
2010
154views more  ITIIS 2010»
14 years 4 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
68
Voted
ECIS
2004
14 years 11 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville
EJIS
2008
48views more  EJIS 2008»
14 years 9 months ago
Measuring research quality: the United Kingdom Government's Research Assessment Exercise
Can research quality be measured meaningfully? Whether it can or not does not interfere with the desire to do so if the motivation is strong enough. This paper discusses the Unite...
Ray J. Paul
SECPERU
2006
IEEE
15 years 3 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
ECIS
2004
14 years 11 months ago
Information system and information infrastructure deployment: the challenge of the Italian e-justice approach
Information systems development methodologies are still mainly concerned with the research of better ways to provide technical solutions for given organizational problems. The pap...
Francesco Contini, Antonio Cordella