Sciweavers

1456 search results - page 16 / 292
» Keeping encountered information
Sort
View
HICSS
2007
IEEE
121views Biometrics» more  HICSS 2007»
15 years 4 months ago
Theorizing in Information Systems Research: Some Preliminary Findings
Information systems (IS) research employs a wide range of theory, drawn from numerous disciplines. Over the course of the past three decades, the proliferation of theory has creat...
Brent Furneaux, Michael Wade, Hossam Ali-Hassan
DCC
1999
IEEE
15 years 2 months ago
Utilizing Soft Information in Decoding of Variable Length Codes
We present a method for utilizing soft information in decoding of variable length codes (VLCs). When compared with traditional VLC decoding, which is performed using "hard&quo...
Jiangtao Wen, John D. Villasenor
79
Voted
IQ
2001
14 years 11 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
91
Voted
CSE
2009
IEEE
14 years 11 months ago
Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks
In Mobile Social Networks (MSN) individuals with similar interests or commonalities connect to each other using the mobile phones. MSN are special kind of Ad-hoc Networks in which ...
Fawad Nazir, Jianhua Ma, Aruna Seneviratne
NCA
2005
IEEE
15 years 3 months ago
Controlling the Coverage of Grid Information Dissemination Protocols
Grid information dissemination protocols distribute information about the dynamic state of computational resources throughout interconnected wide area Grids. Performance metrics f...
Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nae...