Sciweavers

4120 search results - page 629 / 824
» Exploring ocean data
Sort
View
GLOBECOM
2006
IEEE
15 years 9 months ago
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users
— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...
George Theodorakopoulos, John S. Baras
113
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Honeycomb Architecture for Energy Conservation in Wireless Sensor Networks
— Reducing energy consumption has been a recent focus of wireless sensor network research. Topology control explores the potential that a dense network has for energy savings. On...
Ren Ping Liu, Glynn Rogers, Sihui Zhou
101
Voted
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
15 years 9 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
116
Voted
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 9 months ago
Enterprise Architecture Implementation and Management: A Case Study on Interoperability
The focus of this study is to explore why public agencies implement enterprise architecture programs and the interoperability challenges they are faced with when governing these p...
Kristian Hjort-Madsen
119
Voted
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
15 years 9 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson