Sciweavers

4651 search results - page 737 / 931
» A Data Quality Browser
Sort
View
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 3 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
ICASSP
2007
IEEE
14 years 3 months ago
Image-Based Frame Gating of IVUS Pullbacks: A Surrogate for ECG
Intravascular ultrasound (IVUS) is a catheter-based modality which is used to produce high-resolution, cross-sectional images of the interior of blood vessels. By capturing 2-D IV...
Sean M. O'Malley, Stephane G. Carlier, Morteza Nag...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 3 months ago
Supporting the Sink Mobility: a Case Study for Wireless Sensor Networks
— This paper deals with a system level design solution to support information gathering in the presence of a mobile querying node that experiences frequent disconnections from a ...
David Tacconi, Iacopo Carreras, Daniele Miorandi, ...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
14 years 3 months ago
Finite Queuing Model Analysis for Energy and QoS Tradeoff in Contention-Based Wireless Sensor Networks
In contention-based sensor networks, nodes compete to access a shared channel for data transmission and collision is a common challenge. For power conservation, periodical active/s...
Jun Luo, Ling-ge Jiang, Chen He
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 3 months ago
Queuing with Adaptive Modulation over MIMO Wireless Links for Deadline Constrained Traffic: Cross-Layer Analysis and Design
In this paper, we consider a deadline constrained traffic and analyze the joint effects of packet queuing and adaptive modulation (AM) for packet transmission in MIMO systems. We p...
Jalil S. Harsini, Farshad Lahouti