128,361 research outputs found

    Message from the conference chairs

    Get PDF

    The Evolution of a Conference: A Message from the Program Chairs

    Get PDF
    Since the inception of the Information Systems (IS) discipline scholars have questioned and debated what constitutes the domain of IS research. Diversity is not simply desirable it is essential for a discipline that demands understanding of both information technology and contexts of application. The pervasive use of information technology, throughout the economy and society, together with the volatility in interest and support for the discipline, have made the defining of the domain of IS more than just of academic interest. For ACIS for 2009 we seek not to look back at what the IS domain has been, but to look forward to what it is to become. We seek to examine the definition of the IS discipline not by reflecting on where the IS discipline came from, but by exhibiting research at the forefront of where the discipline is heading into the future

    The safety case and the lessons learned for the reliability and maintainability case

    Get PDF
    This paper examine the safety case and the lessons learned for the reliability and maintainability case

    Error resilience analysis of wireless image transmission using JPEG, JPEG 2000 and JPWL

    Get PDF
    The wireless extension of the JPEG 2000 standard formally known as JPWL is the newest international standard for still image compression. Different from all previous standards, this new standard was created specifically for wireless imaging applications. This paper examines the error resilience performance of the JPEG, JPEG 2000 and JPWL standards in combating multi-path and fading impairments in Rayleigh fading channels. Comprehensive objective and subjective results are presented in relation to the error resilience performance of these three standards under various conditions. The major findings in this paper reveal that a CRC approach is not a viable option for protecting wireless image data when not used in conjunction with an efficient retransmission strategy. In addition, the Reed-Solomon error correction codes in JPWL provide strong protection for wireless image transmission. However, any stronger protection beyond RS(64,32) yields diminishing returns

    The enablers and implementation model for mobile KMS in Australian healthcare

    Get PDF
    In this research project, the enablers in implementing mobile KMS in Australian regional healthcare will be investigated, and a validated framework and guidelines to assist healthcare in implementing mobile KMS will also be proposed with both qualitative and quantitative approaches. The outcomes for this study are expected to improve the understanding the enabling factors in implementing mobile KMS in Australian healthcare, as well as provide better guidelines for this process

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    Still Broken: New York State Legislative Reform

    Get PDF
    Still Broken: New York State Legislative Reform is the 2008 update of the Brennan Center's 2004 and 2006 reports on the New York state legislative process. The report finds that the legislative process remains broken, and offers concrete recommendations for reform

    Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents

    Get PDF
    Intelligent agents are an advanced technology utilized in Web Intelligence. When searching information from a distributed Web environment, information is retrieved by multi-agents on the client site and fused on the broker site. The current information fusion techniques rely on cooperation of agents to provide statistics. Such techniques are computationally expensive and unrealistic in the real world. In this paper, we introduce a model that uses a world ontology constructed from the Dewey Decimal Classification to acquire user profiles. By search using specific and exhaustive user profiles, information fusion techniques no longer rely on the statistics provided by agents. The model has been successfully evaluated using the large INEX data set simulating the distributed Web environment

    The impact of traffic localisation on the performance of NoCs for very large manycore systems

    Get PDF
    The scaling of semiconductor technologies is leading to processors with increasing numbers of cores. The adoption of Networks-on-Chip (NoC) in manycore systems requires a shift in focus from computation to communication, as communication is fast becoming the dominant factor in processor performance. In large manycore systems, performance is predicated on the locality of communication. In this work, we investigate the performance of three NoC topologies for systems with thousands of processor cores under two types of localised traffic. We present latency and throughput results comparing fat quadtree, concentrated mesh and mesh topologies under different degrees of localisation. Our results, based on the ITRS physical data for 2023, show that the type and degree of localisation of traffic significantly affects the NoC performance, and that scale-invariant topologies perform worse than flat topologies

    Iowa Health Focus, August 2006

    Get PDF
    Monthly newsletter for the Iowa Department of Public Healt
    • …
    corecore