Search
Now showing items 1-10 of 14
Host Based Dynamic Throughput Maximization Model for IEEE 802.11 WLAN
(Communications in Computer and Information Science, 2010)
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if ...
Semantic access control for corporate mobile devices
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...
Control network programming with SPIDER: Dynamic search control
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming. © 2010 Springer-Verlag.
Non-procedural implementation of local heuristic search in control network programming
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for ...
Effective use of cloud computing in educational institutions
(Procedia - Social and Behavioral Sciences, 2010)
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact ...
Issues in User Generated Content process and a proposed model to solve them
(International Journal of Technology, Knowledge and Society, 2010)
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large ...
The use of internet resources by university students during their course projects elicitation: A case study
(Turkish Online Journal of Educational Technology, 2010)
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their ...
THE USE OF INTERNET RESOURCES BY UNIVERSITY STUDENTS DURING THEIR COURSE PROJECTS ELICITATION: A CASE STUDY
(TURKISH ONLINE JOURNAL EDUCATIONAL TECH-TOJET, 2010)
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their ...
Towards virtualization: A competitive business continuity
(ACADEMIC JOURNALS, 2010)
The ultimate goal of all businesses no matter in which sectors they operate is to maintain their profitability and growth. There is a relationship among the capital, investment, and the personnel in order to achieve ...
Effective use of cloud computing in educational institutions
(ELSEVIER SCIENCE BV, 2010)
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact ...