Sciweavers

7383 search results - page 1440 / 1477
» Theories of information behavior
Sort
View
HASE
2007
IEEE
15 years 4 months ago
Scalable, Adaptive, Time-Bounded Node Failure Detection
This paper presents a scalable, adaptive and timebounded general approach to assure reliable, real-time Node-Failure Detection (NFD) for large-scale, high load networks comprised ...
Matthew Gillen, Kurt Rohloff, Prakash Manghwani, R...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 4 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 4 months ago
Framework for Establishing Enterprise Modeling in the Context of Collaborative Enterprises
Increased market dynamics, shorter product lifecycles and a higher customer involvement in product design have caused great changes to competitive conditions and many companies ar...
Thomas Knothe, Timo Kahl, Dieter Boell, Kristof Sc...
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 4 months ago
Modeling the Economic Cost of Transmission Bottlenecks
— The purpose of this paper is to model the stochastic behavior of nodal prices and use the predicted price differences between zones as the basis for measuring the magnitude and...
Timothy D. Mount, Jaeuk Ju
ICC
2007
IEEE
239views Communications» more  ICC 2007»
15 years 4 months ago
Measuring WCDMA and HSDPA Delay Characteristics with QoSMeT
—Quality of Service (QoS) is becoming increasingly important with the rise of multimedia applications (e.g., voice over IP (VoIP), video conferencing, online gaming, and Internet...
Jarmo Prokkola, Mikko Hanski, Marko Jurvansuu, Mil...
« Prev « First page 1440 / 1477 Last » Next »