The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The way in which people communicate affects their relationship building, social network structures and ultimately the knowledge they receive through their connections. For organizations, an effective knowledge exchange among employees is crucial for the competitive performance. Therefore, companies rely increasingly on social media platforms to facilitate communication and collaboration. To enhance...
The heterogeneous knowledge resources of supply chain partner are vital to improve the efficiency of knowledge utilization and knowledge innovation, ultimately enhance the enterprise's competitive advantage. In order to assess the implementation of knowledge sharing activities in supply chain, fuzzy comprehensive evaluation of knowledge sharing is researched. By analyzing the main influence factors...
The paper proposes a framework which connects knowledge sharing mechanisms with the knowledge awareness and transfer stages for better intra-firm knowledge sharing. This study provides empirical foundation on how to select cost effective and efficient knowledge sharing mechanisms within organization. Two dimensions, namely “Reach” and “Richness” characterize the nature of knowledge sharing mechanisms...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
This paper describes how we can use existing mobile technology to track the vehicle. Here the embedded system along with the mobile is used to prevent the vehicle from being stolen and also if the vehicle is stolen then its location can be tracked. Mobile technology is the fastest growing communication mode. In todaypsilas mobile technology we all are acquainted with short message service (SMS). In...
We propose QUEST (QUality ESTimation), a new method that accurately estimates IEEE 802.11 wireless link quality with no in-band signaling overhead. Existing link quality estimation methods either are based on hello exchanges by fixing or varying transmission rates or rely on the history (e.g., delivery ratio) of previously sent data packets in a per-rate/-neighbor manner. QUEST on the other hand,...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.