In this paper, we develop a new adaptive scheme in which an optimal distance-based update threshold is selected not only as a function of the call-to-mobility ratio, but also as a...
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
The main contribution of this work is to propose a novel call admission and handoff management scheme for LEO satellite networks. A key ingredient in our scheme is a companion pre...
Satellite networks offer a number of desirable characteristics including wide area coverage, unique broadcast capabilities, the ability to communicate with hand-held devices, and ...
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognitionâ...
This paper reports on a specific food and agribusiness industry project, employing new technological capabilities to better transfer expert knowledge. Knowledge transfer and techn...
The research reported in this paper employed Narrative Inquiry in an innovative way in a study of the key factors that influence the career paths of information systems (IS) profe...
Restructuring in electric power sectors took a significant step backward in the summer of 2000 when wholesale and retail markets in California experienced staggering price increas...
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...