Sciweavers

3735 search results - page 652 / 747
» Order compression schemes
Sort
View
EJIS
2007
88views more  EJIS 2007»
15 years 17 days ago
A programme management approach for ensuring curriculum coherence in IS (higher) education
This paper examines IS higher education, concentrating on issues of ‘coherence’ in IS curricula. While curriculum coherence can be jeopardized by poor curriculum design, misal...
Tally Hatzakis, Mark Lycett, Alan Serrano
103
Voted
JNW
2006
111views more  JNW 2006»
15 years 17 days ago
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...
Thavisak Manodham, Tetsuya Miki
117
Voted
JOIN
2006
128views more  JOIN 2006»
15 years 17 days ago
Galo: a Deployable Framework for Providing Better than Best-Effort Quality of Service
In this paper we propose a deployable approach to improving QoS by using a generic, extendable, overlay architecture; the Generalized Application Layer Overlay (GALO). The goals of...
Raheem A. Beyah, Raghupathy Sivakumar, John A. Cop...
118
Voted
NCA
2006
IEEE
15 years 16 days ago
Analysing the localisation sites of proteins through neural networks ensembles
Scientists involved in the area of proteomics are currently seeking integrated, customised and validated research solutions to better expedite their work in proteomics analyses and...
Aristoklis D. Anastasiadis, George D. Magoulas
112
Voted
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 16 days ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau