scispace - formally typeset
Search or ask a question
Institution

Stevens Institute of Technology

EducationHoboken, New Jersey, United States
About: Stevens Institute of Technology is a education organization based out in Hoboken, New Jersey, United States. It is known for research contribution in the topics: Computer science & Cognitive radio. The organization has 5440 authors who have published 12684 publications receiving 296875 citations. The organization is also known as: Stevens & Stevens Tech.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the minimum diameter, maximum connectivity circulant problem is considered and several results are given for the general case and a simple solution is derived for the connectivity four case.
Abstract: It is well known that maximum connectivity graphs play an important role in the design of reliable networks. The class of symmetric graphs called circulants is known to contain such maximum connectivity graphs. Although not all circulants have this maximum connectivity property, those that do have a great variation in their diameters. Since diameter is a measure of transmission delay, the minimum diameter, maximum connectivity circulant problem is considered here. Several results are given for the general case and a simple solution is derived for the connectivity four case.

116 citations

Book ChapterDOI
01 Jan 2015
TL;DR: This chapter discusses the underlying format and types of process events as the common source of analytics information, present techniques for the aggregation and composition of these events, and outline methods that support backward- and forward-looking process analytics.
Abstract: Business Process Management systems (BPMS) are a rich source of events that document the execution of processes and activities within these systems. Business Process Management analytics is the family of methods and tools that can be applied to these event streams in order to support decision making in organizations. The analysis of process events can focus on the behavior of completed processes, evaluate currently running process instances, or focus on predicting the behavior of process instances in the future. This chapter provides an overview of the different methods and technologies that can be employed in each of these three areas of process analytics. We discuss the underlying format and types of process events as the common source of analytics information, present techniques for the aggregation and composition of these events, and outline methods that support backward- and forward-looking process analytics.

116 citations

Journal ArticleDOI
TL;DR: Regression analysis found a positive association between overall strategic alignment maturity and respondents' self-rated maturity and promise for the assessment instrument to be used as a diagnostic tool for organizations to improve their IT-business alignment maturity levels.
Abstract: Achieving IT-business alignment has been a long-standing, critical, information management issue. A theoretical framework of the maturity levels of management practices and strategic IT choices that facilitate alignment was empirically tested and validated. Confirmatory factor analysis CFA validated 6 factors and identified 22 indices to measure strategic alignment maturity. A mixed model repeated measure analysis of variance ANOVA obtained significant results for both the main effect and interaction effect of differences for the 6 maturity factors across the 11 business units. Regression analysis found a positive association between overall strategic alignment maturity and respondents' self-rated maturity. These exploratory findings show promise for the assessment instrument to be used as a diagnostic tool for organizations to improve their IT-business alignment maturity levels.

115 citations

Journal ArticleDOI
TL;DR: It is shown that there is a range of network radii in which PUEA are most successful, and that for the same desired threshold on the probability of missing the primary, WSPRT can achieve a probability of successful P UEA 50% less than that obtained by NPCHT.
Abstract: We present a Neyman-Pearson composite hypothesis test (NPCHT) and a Wald's sequential probability ratio test (WSPRT) to detect primary user emulation attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are no analytical studies available in the literature to study PUEA in the presence of multiple malicious users in fading wireless environments. We present an NPCHT and WSPRT based analysis to detect PUEA in fading wireless channels in the presence of multiple randomly located malicious users. We show that there is a range of network radii in which PUEA are most successful. Results also show that for the same desired threshold on the probability of missing the primary, WSPRT can achieve a probability of successful PUEA 50% less than that obtained by NPCHT.

115 citations


Authors

Showing all 5536 results

NameH-indexPapersCitations
Paul M. Thompson1832271146736
Roger Jones138998114061
Georgios B. Giannakis137132173517
Li-Jun Wan11363952128
Joel L. Lebowitz10175439713
David Smith10099442271
Derong Liu7760819399
Robert R. Clancy7729318882
Karl H. Schoenbach7549419923
Robert M. Gray7537139221
Jin Yu7448032123
Sheng Chen7168827847
Hui Wu7134719666
Amir H. Gandomi6737522192
Haibo He6648222370
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

94% related

Nanyang Technological University
112.8K papers, 3.2M citations

92% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

91% related

University of Maryland, College Park
155.9K papers, 7.2M citations

91% related

Purdue University
163.5K papers, 5.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202342
2022139
2021765
2020820
2019799
2018563