Quantcast
Channel: WSDOT on TechRepublic
Browsing latest articles
Browse All 75 View Live
↧

The Design of Database System for Portfolio of Computer and Information...

This paper aims to the design of database system for portfolio of computer and information technology department and to test the performance systems for portfolio of computer and information technology...

View Article


Comparison of Multiple IaaS Cloud Platform Solutions

Currently, several solution cloud computing IaaS (Infrastructure as a Service) exists. Administrators, developers and users need to choose the best environment for them. The availability of free open...

View Article


Algorithmic Vertical Handoff Decision and Merit Network Selection Across...

Next generation wireless networks must be able to coordinate services between heterogeneous networks through multi-mode mobile terminals. Such heterogeneity poses a challenge to seamless handover since...

View Article

A Partnering Approach to Extending the Business Base Through Cooperation With...

Partnering both opens up and blurs the boundaries between organizations, and even expands them. Firms ought to shape their cooperation with other entities in accordance with their changing needs. A...

View Article

Corporate Risk Management in SMEs

Risks as part of human (corporate) activities have their roots in the uncertainty of future events and result in possible negative differences in the attainment of company goals. With the increasing...

View Article


A Systems Process Management Approach to the Development of Information...

This paper presents a review of business process modelling for information systems development. As a result of the review carried out an approach to modelling processes in Small to Medium Sized...

View Article

Information Flow Modeling to Provide Sustainable Cooperation Between...

Just as all educational institutions try to complement and customize their study programs and various training modules to meet current and future demand, managers in various fields constantly have to...

View Article

Performance Comparison of Spreading Codes in Linear Multi-User Detectors for...

Direct Sequence Code Division Multiple Access (DS-CDMA) system is well known wireless technology. This system suffers from MAI (Multiple Access Interference) caused by Direct Sequence users. Multi-User...

View Article


Utility Based Load Balancing with Grid Computing Approach

Grid Computing is a high performance computing environment that allows sharing of geographically distributed resources across multiple administrative domains and used to solve large scale computational...

View Article


Going Green Business Excellence

There is no doubt about sustainable environmental future and environmental excellence. Environmental Excellence means more than corporate responsibility; it is now a priority issue that global business...

View Article

Client-Independence as the Critical Step Towards a New Level of Cloud Computing

It is nowadays impossible to examine the modern world without picturing it as an information society. Among the most promising directions in current applicative computer science is the development of...

View Article

A Technique of Formal Security Modeling in Autonomic Cloud Computing Environment

As clouds are complex, large-scale, and heterogeneous distributed systems management of their resources is a challenging task. It requires co-optimization at multiple layers (infrastructure, platform,...

View Article

The Improved Hierarchical Clustering Algorithm by a P System with Active...

In this paper, an improved hierarchical clustering algorithm by a P system with active membranes is proposed which provides new ideas and methods for cluster analysis. The membrane system has great...

View Article


The DBSCAN Clustering Algorithm by a P System With Active Membranes

The great characteristic of the P system with active membranes is that not only the objects evolve but also the membrane structure. Using the possibility to change membrane structure, it can be used in...

View Article

Cache Access Pattern Based Algorithm for Performance Improvement of Cache...

Buffer caches are created in main memory and managed by the operating system to avoid the latencies associated with the accesses made by the system call to the secondary storage devices. Changes in...

View Article

Browsing latest articles
Browse All 75 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>