Sciweavers

464 search results - page 31 / 93
» Management Insights
Sort
View
CISS
2008
IEEE
15 years 4 months ago
Imperfect randomized algorithms for the optimal control of wireless networks
Abstract— We consider a joint randomized scheduling, congestion control mechanism for general wireless networks. We allow for a set of imperfections in the operation of the rando...
Atilla Eryilmaz, Asuman E. Ozdaglar, Devavrat Shah...
HICSS
1997
IEEE
107views Biometrics» more  HICSS 1997»
15 years 1 months ago
On Heuristic Mapping of Decision Surfaces for Post-Evaluation Analysis
The value for decision making of high-quality postsolution analysis of decision-supporting models can hardly be overestimated. Candle-lighting analysis (CLA) takes this notion ver...
Major Bill Branley, Russell Fradin, Steven O. Kimb...
HICSS
2008
IEEE
185views Biometrics» more  HICSS 2008»
15 years 4 months ago
Organizational Readiness for Business Process Outsourcing: A Model of Determinants and Impact on Outsourcing Success
In innovation adoption literature, the important role of the organizational context as a determinant of information systems (IS) success has long been pointed out. Various factors...
Sebastian F. Martin, Daniel Beimborn, Mihir A. Par...
IV
2008
IEEE
99views Visualization» more  IV 2008»
15 years 4 months ago
An Interview-Based User Study on the use of Visualizations for Folder Browsing
Hierarchically structured data collections often need to be visualized for the purposes of digital information management and presentation. File browsing, in particular, has an in...
Maria Golemati, Akrivi Katifori, Eugenia G. Gianno...
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 3 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke