Search results for "Computer Networks"

showing 10 items of 860 documents

Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – IS…

2019

ISAT 2018Risk ManagementInformation Systems ArchitectureComputer NetworksInformation Systems
researchProduct

Benchmarking open data efforts through indices and rankings: Assessing development and contexts of use

2022

Abstract This paper aims to provide a broad perspective on the development of benchmarking open data efforts through indices and rankings over the years, both at the level of countries and allowing for a cross-country comparison. The methodology follows a systematic search for the relevant resources, their classification and identification of six open data benchmarks to be further analyzed, the identification of their key components through decomposition, their description, and identifying the similarities and differences. Three major groups of indices and four periods that characterize the efforts to benchmark and measure the development of open data are identified, where the first measure…

Identification (information)Measure (data warehouse)Open dataIndex (economics)Computer Networks and CommunicationsComputer scienceBenchmark (surveying)Rank (computer programming)Openness to experienceBenchmarkingElectrical and Electronic EngineeringData scienceTelematics and Informatics
researchProduct

Collaboration and collaborative information technologies

1999

Collaborative information technologies have been claimed to enhance collaboration in organizations, under certain conditions. This claim was found problematic in several respects, also in the light of the results of 18 case studies of Lotus Notes use, taken from the literature. The cases may be split into three groups: (1) exploratory, conservative, or cautious use; (2) planned and expanding use; and (3) extensive and engaged use of Notes. In the first group, no changes in work arrangements due to Notes use could be found. In the second group, the planned Notes applications supported the established work arrangements, both collaborative and hierarchical. Only in the third group were there s…

ImprovisationKnowledge managementWork (electrical)Computer Networks and Communicationsbusiness.industryProcess (engineering)Information technologySociologyProduct (category theory)businessConstructiveManagement Information SystemsACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

On the Statistical Properties of Phase Crossings and Random FM Noise in Double Rayleigh Fading Channels

2016

In this paper, we study the statistics of phase processes and random frequency modulation (FM) noise encountered in double Rayleigh fading channels. The Rayleigh processes making up the double Rayleigh channel are assumed to be independent but not necessarily identically distributed. The Doppler power spectral densities of these processes are supposed to be symmetric about the carrier frequency. Under these fading conditions, we derive first an expression for the joint probability density function (jpdf) of the phase process and its rate of change. Capitalizing on this jpdf formula, we then investigate the probability density function (pdf) and cumulative distribution function (cdf) of rand…

Independent and identically distributed random variablesComputer Networks and CommunicationsRayleigh distributionCumulative distribution functionAerospace Engineering020302 automobile design & engineering020206 networking & telecommunicationsProbability density function02 engineering and technologyNoise (electronics)Moment (mathematics)0203 mechanical engineeringAutomotive Engineering0202 electrical engineering electronic engineering information engineeringElectronic engineeringFadingStatistical physicsElectrical and Electronic EngineeringComputer Science::Information TheoryMathematicsRayleigh fadingIEEE Transactions on Vehicular Technology
researchProduct

Improving RF Fingerprinting Methods by Means of D2D Communication Protocol

2019

Radio Frequency (RF) fingerprinting is widely applied for indoor positioning due to the existing Wi-Fi infrastructure present in most indoor spaces (home, work, leisure, among others) and the widespread usage of smartphones everywhere. It corresponds to a simple idea, the signal signature in a location tends to be stable over the time. Therefore, with the signals received from multiple APs, a unique fingerprint can be created. However, the Wi-Fi signal is affected by many factors which degrade the positioning error range to around a few meters. This paper introduces a collaborative method based on device-to-device (D2D) communication to improve the positioning accuracy using only fingerprin…

Indoor positioningComputer Networks and CommunicationsComputer scienceReal-time computinglcsh:TK7800-83605G-tekniikkaD2D02 engineering and technologyRF fingerprintingSignal0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringRFIDSIMPLE (military communications protocol)ta213etätunnistuslcsh:ElectronicsFingerprint (computing)indoor positioning020206 networking & telecommunicationsSignature (logic)RF FingerprintingHardware and ArchitectureControl and Systems EngineeringsisätilapaikannusSignal Processing020201 artificial intelligence & image processingRadio frequencyCommunications protocol5G5G
researchProduct

Multiple viewpoints increase students' attention to source features in social question and answer forum messages

2016

International audience; Social question & answer forums offer great learning opportunities, but students need to evaluate the credibility of answers to avoid being misled by untrustworthy sources. This critical evaluation may be beyond the capabilities of students from primary and secondary school. We conducted 2 studies to assess how students from primary, secondary, and undergraduate education perceive and use 2 relevant credibility cues in forums: author's identity and evidence used to support his answer. Students didn't use these cues when they evaluated forums with a single answer (Experiment 1), but they recommended more often answers from self‐reported experts than from users with a …

Information Systems and ManagementComputer Networks and Communications4. EducationInformation literacy05 social sciences050301 educationIdentity (social science)Library and Information SciencesPseudonymViewpointsPreferenceWorld Wide WebCredibility[SCCO.PSYC]Cognitive science/PsychologyMathematics educationComputingMilieux_COMPUTERSANDEDUCATION0509 other social sciences050904 information & library sciencesPsychology0503 educationInclusion (education)CurriculumInformation Systems
researchProduct

Behavior-based personalization in web search

2016

Personalized search approaches tailor search results to users' current interests, so as to help improve the likelihood of a user finding relevant documents for their query. Previous work on personalized search focuses on using the content of the user's query and of the documents clicked to model the user's preference. In this paper we focus on a different type of signal: We investigate the use of behavioral information for the purpose of search personalization. That is, we consider clicks and dwell time for reranking an initially retrieved list of documents. In particular, we (i) investigate the impact of distributions of users and queries on document reranking; (ii) estimate the relevance …

Information Systems and ManagementComputer Networks and CommunicationsComputer sciencehenkilökohtaistaminenInformationSystems_INFORMATIONSTORAGEANDRETRIEVALtiedonhakujärjestelmät02 engineering and technologyLibrary and Information SciencesPersonalizationRanking (information retrieval)Query expansionkustomointiWeb query classification020204 information systems0202 electrical engineering electronic engineering information engineeringRelevance (information retrieval)tiedonhakupersonointiInternetFocus (computing)Information retrievalWeb search queryPersonalized searchRankinghakupalvelut020201 artificial intelligence & image processingInformation SystemsJournal of the Association for Information Science and Technology
researchProduct

Assessing the Effect of the Economy for the Common Good System on Business Performance

2023

Extant literature has pointed to organizational hybridity to lever sustainable business transformation. Moreover, some authors hold that there is a possible trade-off between sustainability and performance. However, there is still little empirical evidence on the impact that such sustainability-driven hybridization systems have on performance. Thus, the present study’s main goal is to fill this gap by providing empirical evidence on the impact of the implementation of the Economy for the Common Good, as a sustainability-driven organizational system, on business performance. To do so, the authors relied on a sample of 206 businesses from five European countries. Then, the authors follo…

Information Systems and ManagementComputer Networks and CommunicationsEconomia d'empresacorporate sustainabilityÈtica empresarialsustainable business model innovationControl and Systems EngineeringModeling and Simulationeconomy for the common goodDesenvolupament sosteniblehybridization systemsSoftwareSDGsperformance
researchProduct

A World without Islam

2012

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitectureIslamSociologyTheologyReligious studiesSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Conflictive Touring

2015

Problems to understand social phenomenon associates to our misconceptions, stereotypes and prejudices imposed during our early socialization. This happens not only with tourism which is valorized as a right of all citizens in modern societies, but also with terrorism, judged as the main threat of West. However, what would happen if both would be different sides of the same coin? This essay review explores the roots of tourism and terrorism during the process of unionization in US. What on one hand resulted in a hyper-mobile process that shore up tourism, on another was a desesperate attempt to struggle against terrorism. In this vein, it is safe to say that tourism is terrorism by other mea…

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitecturePolitical scienceLawTerrorismCriminologySafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct