Search results for "Information Systems."

showing 10 items of 1545 documents

Segmenting the audience of a cause-related marketing viral campaign

2021

Abstract This paper analyses the attitudinal effect of a cause-related marketing campaign which becomes viral through social networks. This attitudinal response is observed in three Internet user segments with different affinity levels: i) strong (familiar with the sponsoring brand and the promoted cause); ii) intermediate (familiar with the brand or the cause); and iii) weak (without previous experiences of either the brand or the social cause). To develop our experiment, 360 Internet surfers agree to participate. Their attitudes were measured before and after the showing of a viral spot in which a pet food brand encourages pet adoption. Our results show that a viral campaign works perfect…

Computer Networks and Communicationsbusiness.industry05 social sciences02 engineering and technologyLibrary and Information SciencesPet foodMarket segmentation020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingThe InternetMarketing campaignMarketingbusinesshealth care economics and organizationsInformation SystemsInternational Journal of Information Management
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

The generalized method of equal areas for the design of sum-of-cisoids simulators for mobile Rayleigh fading channels with arbitrary Doppler spectra

2011

We present in this paper a generalized version of the method of equal areas (MEA) that is well suited for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels characterized by any type of Doppler power spectral densities (DPSDs). Unlike the original MEA, the generalized MEA (GMEA) can be applied to the simulation of fading channels with asymmetrical DPSDs. This is an important feature because the simulation of such channels is of great interest for the laboratory analysis of mobile communication systems under non-isotropic scattering conditions. We show that irrespective of the underlying DPSD, the GMEA results in a very good approximation to the auto…

Computer Networks and Communicationsbusiness.industryComputer scienceAutocorrelationPower (physics)symbols.namesakeNarrowbandsymbolsFadingElectrical and Electronic EngineeringTelecommunicationsbusinessEnvelope (mathematics)Doppler effectAlgorithmComputer Science::Information TheoryInformation SystemsCommunication channelRayleigh fadingWireless Communications and Mobile Computing
researchProduct

Performance of power control in inter-cell interference coordination for frequency reuse

2010

To mitigate inter-cell interference in 3G evolution systems, a novel inter-cell interference coordination scheme called soft fractional frequency reuse is proposed in this article, which enables to improve the data rate in cell-edge. On this basis, an inter-cell power control is presented for the inter-cell interference coordination, and the inter-cell balanced signal to interference plus noise ratio (SINR) among users is established for power allocation, which enables mitigation of inter-cell interference. Especially, the power control is based on a novel exponential kernel equation at higher convergence speed than the traditional arithmetic kernel equations. Numerical results show that th…

Computer Networks and Communicationsbusiness.industryComputer scienceBlocking (statistics)Interference (wave propagation)Quantitative Biology::Cell BehaviorPower (physics)Exponential functionTelecomunicacióKernel (statistics)Signal ProcessingConvergence (routing)Electronic engineeringTelecommunicationsbusinessComunicació i tecnologiaThroughput (business)Information SystemsPower controlThe Journal of China Universities of Posts and Telecommunications
researchProduct

Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?

2007

Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless ad hoc networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingThroughputNetwork topologyIEEE 802.11Packet lossNetwork performancebusinessInformation SystemsComputer networkJournal of Communications and Networks
researchProduct

Channel-dependent load balancing in wireless packet networks

2004

This paper refers to a wireless cellular packet network scenario where fast retransmission of corrupted packets is used to improve the packet error ratio. Since the ‘gross’ packet transmission rate (including retransmission) depends on the channel quality perceived, admitted calls weight unevenly in terms of effective resource consumption. In this paper, we suggest using channel quality information to drive load balancing mechanisms. We propose two novel metrics to determine the best cell to attach to, during handover or new call origination. Extensive simulation results prove the superiority of our proposed schemes with respect to traditional load balancing, which base their operation on t…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLoad balancing (computing)Packet switchingHandoverResource allocationWirelessElectrical and Electronic EngineeringbusinessError detection and correctionInformation SystemsCommunication channelComputer networkWireless Communications and Mobile Computing
researchProduct

User behaviours after critical mobile application incidents: the relationship with situational context

2015

Users occasionally have critical incidents with information systems IS. A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context,…

Computer Networks and Communicationsbusiness.industrymedia_common.quotation_subject05 social sciencesInternet privacyWord of mouthAdvertisingContext (language use)02 engineering and technologyService provider020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation system050211 marketingContinuanceSituational ethicsPsychologybusinessFunction (engineering)SoftwareMobile serviceInformation Systemsmedia_commonInformation Systems Journal
researchProduct

A tale of two frames : Exploring the role of framing in the use discontinuance of volitionally adopted technology

2022

https://doi.org/10.1111/isj.12355 The discontinuance of volitional IS (i.e., information systems adopted, used and discontinued at will) has recently attracted remarkable attention from academics and practitioners alike. However, most research to date has been ahistorical. Ignoring the temporal progression can be problematic when the phenomenon under investigation is dynamic and evolving. To balance this, we adopt a stage modelling approach to understand the process ending with the technology use being discontinued by users of a popular crowdsourcing platform. Two questions guided our investigation: (1) Why do users discontinue using an IS they have volitionally adopted and used? (2) How do…

Computer Networks and Communicationskäyttäjätqualitative studyMedia studiestietotekniikkaIS discontinuancekäyttöFraming (construction)teknologiavolitional ISlopettaminenstage modelPsychologyomaksuminenSoftwareInformation SystemsQualitative researchkäyttäjätutkimus
researchProduct

On coincidence of feedback and global Stackelberg equilibria in a class of differential games

2021

This paper shows for a class of differential games that the global Stackelberg equilibrium (GSE) coincides with the feedback Stackelberg equilibrium (FSE), although the GSE assumes that the leader/regulator an- nounces at the initial time the regulatory instrument rule she will follow for the rest of the game, while in the FSE, the regulator at any time chooses the optimal level of the regulatory instrument rate. This coincidence is based on the fact that the FSE is calculated using dynamic programming what implies that although the regulator chooses the regulatory instrument rate level that maximizes social welfare, the first-order condition for the maximization of the right-hand side of t…

Computer Science::Computer Science and Game Theory050210 logistics & transportation021103 operations researchInformation Systems and ManagementGeneral Computer ScienceComputer scienceQuantitative Biology::Molecular Networks05 social sciences0211 other engineering and technologies02 engineering and technologyMaximizationManagement Science and Operations ResearchOutcome (game theory)Industrial and Manufacturing EngineeringCoincidenceModeling and Simulation0502 economics and businessDifferential gameStackelberg competitionEconomic modelDifferential (infinitesimal)Mathematical economicsEuropean Journal of Operational Research
researchProduct

Learning by the Process of Elimination

2002

AbstractElimination of potential hypotheses is a fundamental component of many learning processes. In order to understand the nature of elimination, herein we study the following model of learning recursive functions from examples. On any target function, the learning machine has to eliminate all, save one, possible hypotheses such that the missing one correctly describes the target function. It turns out that this type of learning by the process of elimination (elm-learning, for short) can be stronger, weaker or of the same power as usual Gold style learning.While for usual learning any r.e. class of recursive functions can be learned in all of its numberings, this is no longer true for el…

Computer Science::Machine LearningProcess of eliminationGeneralization0102 computer and information sciences02 engineering and technology01 natural sciencesNumberingComputer Science ApplicationsTheoretical Computer ScienceDecidabilityAlgebraComputational Theory and Mathematics010201 computation theory & mathematicsPhysics::Plasma Physics0202 electrical engineering electronic engineering information engineeringRecursive functions020201 artificial intelligence & image processingEquivalence (formal languages)Information SystemsMathematicsInformation and Computation
researchProduct