Understanding the use of diagrams and other components of scholarly systems-related papers may inform us about the papers, the field, and the way we think. We analyze 495 papers c...
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
David E. Newman, Bertrand Nkei, Benjamin A. Carrer...
Organizations are increasingly using cross-functional project teams to increase flexibility. The belief is that individuals will be able to share and combine their different knowl...
Sue Newell, Susan Adams, Marcy Crary, Priscilla Gl...
This paper presents a distributed sleep scheduling protocol that can be used for implementing synchronous interface sleep for energy conservation in wireless Ad Hoc networks. Cent...
This paper presents a multi-layered valuation framework for pricing investment advisory services, using service modules as product specification and a reference base for pricing. ...
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Finding images over the internet can be trying at best. Many industries such as advertising, marketing, image consultants, print media, and medical imaging deal with electronic im...
In our paper last year [1], we described our languagetraining program, which utilizes Baldi as a tutor, who guides students through a variety of exercises designed to teach vocabu...
Dominic W. Massaro, Slim Ouni, Michael M. Cohen, R...
This paper attempts to create a research cycle for Problem Based Learning and in so doing help substantiate the use of PBL in business school environments. The paper starts with a...