Search
Now showing items 1-5 of 5
Using merkle tree to mitigate cooperative black-hole attack in Wireless Mesh Networks
(The Science and Information Organization Inc., www.ijacsa.thesai.org, 2011)
Security is always a major concern and a topic of hot discussion to users of Wireless Mesh Networks (WMNs). The open architecture of WMNs makes it very easy for malicious attackers to exploit the loopholes in the routing ...
Computing knowledge and skills demand: A content analysis of job adverts in Botswana
(The Science and Information Organization, http://thesai.org/Publication/Default.aspx, 2011)
This paper presents the results of a content analysis of
computing job adverts to assess the types of skills required by
employers in Botswana. Through the study of job adverts for
computing professionals for one year ...
Assessing acceptance of adaptive educational hypermedia systems: prior knowledge vs. cognitive styles
(International Journal of Computer Science Issues, http://www.ijcsi.org/index.php, 2012)
Perceived usefulness and ease of use have proved to be key
determinants of the acceptance and usage of e-learning
systems. On the contrary, little is known about students'
perceptions in Adaptive Educational Hypermedia ...
A tag-like, linked navigation approach for retrieval and discovery of desktop documents
(Springer, www.springer.com, 2011)
Computer systems provide users with abilities to create, organize, store and access information. Most of this information is in the form of documents in files organized in the hierarchical folder structures provided by ...
Analyzing the load balance of term-based partitioning
(The Science and Information Organization Inc., http://ijacsa.thesai.org/, 2011)
In parallel (IR) systems, where a large-scale collection
is indexed and searched, the query response time is limited by the
time of the slowest node in the system. Thus distributing the load equally across the nodes is ...