This article reviews the way in which the spread of computing technology has impacted the search and seizure policies of relevant U.S. government agencies. Among the changes that have occurred is a total redesign by t...
This article reviews the way in which the spread of computing technology has impacted the search and seizure policies of relevant U.S. government agencies. Among the changes that have occurred is a total redesign by the Justice Department of its search and seizure guidelines and policies. the article discusses numerous questions that involve search and seizure procedures as they pertain to the use of computing technology.
The advantage of magnetic resonance imaging (MRI)-guided surgery, in which MR images taken during surgery are used to guide the surgery, has been recognized recently. However, there is a problem, due to long imaging t...
详细信息
Adequate protection of an organization's information assets is becoming more valued, especially in a time when protecting these assets has become much more difficult. information security problems are increasing g...
Adequate protection of an organization's information assets is becoming more valued, especially in a time when protecting these assets has become much more difficult. information security problems are increasing globally because of several interrelated trends, including the move to distributed computing, the growth of the Internet, and the cash market that now exists in information. Conducting a rigorous, quantitative risk analysis is the single most important step in the protection of information.
In this paper the authors propose a structural method for a genetic algorithm (GA) for the optimization problem of cable routing in which cables have to be laid optimally. When there are no limits on the layout routes...
详细信息
There is a high demand for online graduate programs in various engineering and technology fields. The reasoning is simple: there is a large pool of working professionals needing graduate study, but cannot afford to in...
详细信息
There is a high demand for online graduate programs in various engineering and technology fields. The reasoning is simple: there is a large pool of working professionals needing graduate study, but cannot afford to in-person due to their job, family, or distance limitations. The Department of Technology systems, within the College of Technology and computer Science (TECS) at East Carolina University has been offering several Internet-based graduate programs since 1995. This paper focuses on the Master of Science in Industrial Technology (MSIT) that has several concentrations, including computer Networking Management, Digital Communications, and information Security. All courses in the MSIT program are delivered 100% online, with majority of the technical courses having lab-intensive, hands-on components. This paper shares information pertaining to some of the issues and experiences of offering graduate, hands-on programs in information technology (IT) completely online.
Processing requirement of a complex autonomous robotic vehicle demands high efficiency in algorithmic and software execution. Today's advanced computer hardware technology provides processing capabilities that wer...
详细信息
This paper addresses the dynamic location management for personal communication service (PCS) networks with consideration of mobility patterns. The popular hexagonal cellular architecture is considered. In this paper,...
详细信息
The development of the World Wide Web (or Internet) has provided the ability to connect the entire world together. Thousands of web servers located around the world allow users to connect and communicate with one anot...
详细信息
ISBN:
(纸本)0769523870
The development of the World Wide Web (or Internet) has provided the ability to connect the entire world together. Thousands of web servers located around the world allow users to connect and communicate with one another. Additionally, a huge transaction based product sales business has evolved, via the Internet. For many, the next generation of the Internet needs to focus on collections of servers and users working collectively together to solve problems. Grids and the Global information Grid (GIG) are terms associated with enabling technologies that provide the framework for collections of servers and users to work together. Network Centric Operations and/or Network Centric Warfare are terms that refer to the actual concepts, applications, and processes that will execute on the GIG and solve real world problems. Moving to this "next generation Internet" provides many exciting opportunities as well as many difficult challenges. This year's panel will explore these opportunities and challenges from several different perspectives: government, defense industry, commercial industry and academia.
Distance Learning physically separates the learner from the teacher often forfeiting the traditional support available in a face-to-face model. What are the issues and lessons learned in supporting teachers and learne...
详细信息
ISBN:
(纸本)1595930590
Distance Learning physically separates the learner from the teacher often forfeiting the traditional support available in a face-to-face model. What are the issues and lessons learned in supporting teachers and learners in Distance Learning? The panelists will share their experience and lessons learned. Copyright 2005 ACM.
暂无评论