Browsing 08 Information and Computing Sciences by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

  • >
  • >

Browsing 08 Information and Computing Sciences by Title

Sort by: Order: Results:

  • Nikodem, Jan; Nikodem, Maciej; Woda, Marek; Klempous, Ryszard; Chaczko, Zenon (InTech, 2010)
    Chapter 7 introduces a relational model that represents the dependences between nodes of the network and defines the actions of these nodes in different situations. Based on this model, communication activities of the ...
  • Chowdhury, Sudatta; Gibb, F (Emerald Group Publishing Limited, 2009)
    Purpose - This paper aims to argue that different types Of uncertainty are associated with information seeking and retrieval (IS&R), and that, with the proliferation of new and different search tools, channels and sources, ...
  • Alami, Adam; Wong, Bernard; Mcbride, Tom (Ivy League Publishing, 2008)
    Recent studies have shown a substantial growth in the global IT outsourcing market. The literature discusses an extensive range of various IT outsourcing models. This study introduces a cross onshore and offshore outsourcing ...
  • Lopez, Mike; Whalley, J; Robbins, P; Lister, Raymond (Association of Computing Machinery, 2008)
    ABSTRACT: This study analyzed student responses to an examination, after the students had completed one semester of instruction in programming. The performance of students on code tracing tasks correlated with their ...
  • Krastev, Boris; Lowe, David; Murray, Stephen (Kassel University Press, 2010)
    Release planning, the process of allocating particular features to specific system releases, is generally considered to be complex task where multiple factors need to be evaluated. Stakeholder involvement is a particular ...
  • Anderson, Theresa (Univ Sheffield Dept Information Studies, 2005)
    Introduction. This paper discusses how exploring the research process in-depth and over time contributes to a fuller understanding of interactions with various representations of information. Method. A longitudinal ...
  • Anderson, Theresa (Information Science Reference, 2008)
  • Syed Mohamad, Sharifah; Mcbride, Tom (IEEE Computer Society Publications, 2008)
    We examine two active and popular open source products to observe whether or not open source software has a different defect arrival rate than software developed in-house. The evaluation used two common models of reliability ...
  • Clear, Tony; Whalley, J; Lister, Raymond; Carbone, Angela; Hu, Minjie; Sheard, Judithe; Simon, Beth; Thompson, Errol (National Advisory Committee on Computing Qualifications, 2008)
    Abstract: Past papers of the BRACElet project have described an approach to teaching and assessing students where the students are presented with short pieces of code, and are instructed to explain, in plain English, what ...
  • Kirby, Michael (2010-11-08)
    The Honourable Michael Kirby discusses the relationship between Religion and HIV. Kirby has been involved in international activities in response to the HIV/AIDS epidemic since the mid-1980s. Recently, he attended a ...
  • Fischer, Martin; Lim, Yen Yang; Lawrence, Elaine; Ganguli, Leena (IEEE Computer Society, 2008)
    The following topics are dealt with: mobile business; nanotechnology; new business models; new business services; social change; policy; ethics; responsibility; ubiquitous computing; pervasive computing; mobile application ...
  • Suffern Kevin; Balsys Ronald (Institute of Electrical and Electronics Engineers, 2003)
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Renping; Tan, Thomas; He, Sean (Elsevier BV, 2013)
    Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data ...
  • Hintz, Thomas; Szewcow, Ury; He, Sean (Elsevier Science Bv, 1998)
    Edge detection in computer vision and image processing is a process which detects one kind of significant feature in an image that appears as discontinuities in intensities. A parallel edge detection algorithm based on ...
  • Agbinya, Johnson; Chaczko, Zenon; Mohamed Mowjoon, Dr. Mahira (Newswood Limited, International Association of Engineers, 2009)
    In recent years wireless mesh network (WMN) technologies and their applications have been actively researched and developed as the promising solution for future wireless mobile networks. Conversely security of WMN is often ...
  • Berry, Rodney (IEEE, 2013)
    This research centres on the development of a number of prototype interactive systems, each of which uses a tangible means of representation and manipulation of musical elements in musical composition. Data gathered through ...
  • Li, Sanjiang (Elsevier B.V., 2007)
    Decision making under uncertainty is one of the central tasks of artificial agents. Due to their simplicity and ease of specification, qualitative decision tools are popular in artificial intelligence. Brafman and Tennenholtz ...
  • Gonzalez Perez, Cesar; Henderson-Sellers, Brian (IOS Press, 2005)
  • Debenham, John; Sierra, Carles (Springer, 2010)
    A model of reputation is presented in which agents share and aggregate their opinions, and observe the way in which their opinions effect the opinions of others. A method is proposed that supports the deliberative process ...
  • Chang, Elizabeth; Hussain, Farookh; Dillon, Tharam (Springer, 2005)
    The growing development of web-based reputation systems in the 21st century will have a powerful social and economic impact on both business entities and individual customers, because it makes transparent quality assessment ...