Institution
Stevens Institute of Technology
Education•Hoboken, New Jersey, United States•
About: Stevens Institute of Technology is a education organization based out in Hoboken, New Jersey, United States. It is known for research contribution in the topics: Computer science & Cognitive radio. The organization has 5440 authors who have published 12684 publications receiving 296875 citations. The organization is also known as: Stevens & Stevens Tech.
Topics: Computer science, Cognitive radio, Communication channel, Wireless network, Artificial neural network
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the minimum diameter, maximum connectivity circulant problem is considered and several results are given for the general case and a simple solution is derived for the connectivity four case.
Abstract: It is well known that maximum connectivity graphs play an important role in the design of reliable networks. The class of symmetric graphs called circulants is known to contain such maximum connectivity graphs. Although not all circulants have this maximum connectivity property, those that do have a great variation in their diameters. Since diameter is a measure of transmission delay, the minimum diameter, maximum connectivity circulant problem is considered here. Several results are given for the general case and a simple solution is derived for the connectivity four case.
116 citations
••
116 citations
••
01 Jan 2015TL;DR: This chapter discusses the underlying format and types of process events as the common source of analytics information, present techniques for the aggregation and composition of these events, and outline methods that support backward- and forward-looking process analytics.
Abstract: Business Process Management systems (BPMS) are a rich source of events that document the execution of processes and activities within these systems. Business Process Management analytics is the family of methods and tools that can be applied to these event streams in order to support decision making in organizations. The analysis of process events can focus on the behavior of completed processes, evaluate currently running process instances, or focus on predicting the behavior of process instances in the future. This chapter provides an overview of the different methods and technologies that can be employed in each of these three areas of process analytics. We discuss the underlying format and types of process events as the common source of analytics information, present techniques for the aggregation and composition of these events, and outline methods that support backward- and forward-looking process analytics.
116 citations
••
TL;DR: Regression analysis found a positive association between overall strategic alignment maturity and respondents' self-rated maturity and promise for the assessment instrument to be used as a diagnostic tool for organizations to improve their IT-business alignment maturity levels.
Abstract: Achieving IT-business alignment has been a long-standing, critical, information management issue. A theoretical framework of the maturity levels of management practices and strategic IT choices that facilitate alignment was empirically tested and validated. Confirmatory factor analysis CFA validated 6 factors and identified 22 indices to measure strategic alignment maturity. A mixed model repeated measure analysis of variance ANOVA obtained significant results for both the main effect and interaction effect of differences for the 6 maturity factors across the 11 business units. Regression analysis found a positive association between overall strategic alignment maturity and respondents' self-rated maturity. These exploratory findings show promise for the assessment instrument to be used as a diagnostic tool for organizations to improve their IT-business alignment maturity levels.
115 citations
••
TL;DR: It is shown that there is a range of network radii in which PUEA are most successful, and that for the same desired threshold on the probability of missing the primary, WSPRT can achieve a probability of successful P UEA 50% less than that obtained by NPCHT.
Abstract: We present a Neyman-Pearson composite hypothesis test (NPCHT) and a Wald's sequential probability ratio test (WSPRT) to detect primary user emulation attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are no analytical studies available in the literature to study PUEA in the presence of multiple malicious users in fading wireless environments. We present an NPCHT and WSPRT based analysis to detect PUEA in fading wireless channels in the presence of multiple randomly located malicious users. We show that there is a range of network radii in which PUEA are most successful. Results also show that for the same desired threshold on the probability of missing the primary, WSPRT can achieve a probability of successful PUEA 50% less than that obtained by NPCHT.
115 citations
Authors
Showing all 5536 results
Name | H-index | Papers | Citations |
---|---|---|---|
Paul M. Thompson | 183 | 2271 | 146736 |
Roger Jones | 138 | 998 | 114061 |
Georgios B. Giannakis | 137 | 1321 | 73517 |
Li-Jun Wan | 113 | 639 | 52128 |
Joel L. Lebowitz | 101 | 754 | 39713 |
David Smith | 100 | 994 | 42271 |
Derong Liu | 77 | 608 | 19399 |
Robert R. Clancy | 77 | 293 | 18882 |
Karl H. Schoenbach | 75 | 494 | 19923 |
Robert M. Gray | 75 | 371 | 39221 |
Jin Yu | 74 | 480 | 32123 |
Sheng Chen | 71 | 688 | 27847 |
Hui Wu | 71 | 347 | 19666 |
Amir H. Gandomi | 67 | 375 | 22192 |
Haibo He | 66 | 482 | 22370 |