The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of our study is to examine whether the overall organization of behavior differs when people report truthful vs. deceptive messages within the framework of the T-pattern model. We tested the hypothesis that the differences between liars and truth tellers will be greater under high cognitive load conditions. We argue that recalling stories in reverse order will produce cognitive overloading...
Nowadays, activities and decisions making in an organization is based on data and information obtained from data analysis, which provides various services for constructing reliable and accurate process. As data are significant resources in all organizations the quality of data is critical for managers and operating processes to identify related performance issues. Moreover, high quality data can increase...
This study develops a questionnaire to measure nurses' perceptions of information quality for clinical decision making in hospital settings. The instrument is developed through a pretest, pilot test, and full survey process. A total of 214 questionnaires were received from chief nursing officers in the full survey process. Principal component analysis and Cronbach's alpha are used to confirm the validity...
Since the requirements of task cooperation become more complicated and dynamic, the Federated Identity Management (FIdM) should be more safe and flexible to allow and facilitate participating federated organizations, to share information and grant or deny service access requests. Trust is the base of forming federation, and it's a novel idea to establish a security mechanism based on trust for a fair...
Through scenarios describing the traditional organization structures, this paper makes an advancement, shows how Equipment Efficient Support cobweb organization structure works much more efficient than the traditional structures by scientific analysis and evaluation of them, and proved by the Order Degree model which is built on entropy theory. This finding provides an academic base for developing...
Accuracy of the functional size is critical in software project management, since functional size is the most prevalent input for effort and cost estimation models. Functional size measurement is performed based on standardized manuals; however, the accuracy of FSM results is still based on the knowledge and cautions of the measurers. In this study we performed a multiple case study to identify the...
We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved...
Work on the construction site is known to be inefficient due to workers spending much time waiting for materials, transporting materials and from frequent interruptions of tasks. Studies on the construction site typically use statistical measures to analyse the sampled data about work and such measures, while very useful, can overlook important features of the data. In this paper we apply a previously...
Dimensional analysis from a single image is an interesting topic of investigation in the research community, even though range sensors are becoming a common alternative for the generation of metric information in real-time. The interest in obtaining metric measurements from a single image is motivated by a wide spectrum of applications such as cultural heritage, civil engineering, urban planning,...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
In this paper, we propose a cognitive radio-based multi-user resource allocation framework for mobile ad hoc networks using multi-carrier DS CDMA modulation over a frequency-selective fading channel. In particular, given pre-existing communications in the spectrum where the system is operating, in addition to potential narrow-band interference, a channel sensing and estimation mechanism is provided...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.