Sciweavers

7366 search results - page 1290 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
SIGUCCS
2005
ACM
15 years 10 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
SSDBM
1999
IEEE
118views Database» more  SSDBM 1999»
15 years 9 months ago
Evaluation of Ad Hoc OLAP: In-Place Computation
Large scale data analysis and mining activities, such as identifying interesting trends, making unusual patterns to stand out and verifying hypotheses, require sophisticated infor...
Damianos Chatziantoniou
165
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
TON
2010
204views more  TON 2010»
14 years 11 months ago
Passive Diagnosis for Wireless Sensor Networks
Network diagnosis, an essential research topic for traditional networking systems, has not received much attention for wireless sensor networks. Existing sensor debugging tools li...
Yunhao Liu, Kebin Liu, Mo Li
IJITM
2010
93views more  IJITM 2010»
15 years 3 months ago
A group evidential reasoning approach for enterprise architecture framework selection
: Enterprise architecture (EA) frameworks are used to ensure interoperability of information systems and improve the effectiveness and efficiency of business organisations. Several...
Faramak Zandi, Madjid Tavana
« Prev « First page 1290 / 1474 Last » Next »