Sciweavers

1776 search results - page 273 / 356
» Informational cascades in IT adoption
Sort
View
TSE
2008
103views more  TSE 2008»
15 years 1 months ago
A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance
The Unified Modeling Language (UML) is the de facto standard for object-oriented software analysis and design modeling. However, few empirical studies exist which investigate the c...
Wojciech J. Dzidek, Erik Arisholm, Lionel C. Brian...
TSMC
2008
172views more  TSMC 2008»
15 years 1 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
TSP
2008
120views more  TSP 2008»
15 years 1 months ago
Distributed Average Consensus With Dithered Quantization
In this paper, we develop algorithms for distributed computation of averages of the node data over networks with bandwidth/power constraints or large volumes of data. Distributed ...
Tuncer C. Aysal, Mark Coates, Michael Rabbat
JSAC
2007
130views more  JSAC 2007»
15 years 1 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
TWC
2008
150views more  TWC 2008»
15 years 1 months ago
Improved iterative detection and achieved throughputs of OFDM systems under imperfect channel estimation
Abstract--Assuming imperfect channel estimation, we propose an improved detector for orthogonal frequency-division multiplexing (OFDM) systems over a frequency-selective fading cha...
Seyed Mohammad Sajad Sadough, Pierre Duhamel