University of Southern Queensland

Displaying 1-9 of 9 results

  • White Papers // Aug 2010

    Linear Model of Adapting Frame Size in DFSA of Passive GEN2 RFID Systems

    Low costs of passive UHF RFID tags, as well as their simplicity makes them appropriate for the localization and tracking services in today's fast-moving, information rich trading networks. However, a few disadvantages of passive RFID technology performances, as a reading range of passive tags and high collision rate during RFID...

    Provided By University of Southern Queensland

  • White Papers // Jul 2010

    Corporate Intellectual Capital Disclosure In A Non-Mandatory Disclosure Regime

    The purpose of this paper is to present an overview of corporate discretionary intellectual capital reporting in Bangladesh. From a sample of 136 listed companies with Dhaka Stock Exchange and by using the content analysis with codification of data, it examines the extent of intellectual capital reporting. It is found...

    Provided By University of Southern Queensland

  • White Papers // Jun 2010

    Integrating Diversity Management Initiatives With Strategic Human Resource Management

    Managing diversity is usually viewed in broad conceptual terms as recognizing and valuing differences among people; it is directed towards achieving organizational outcomes and reflects management practices adopted to improve the effectiveness of people management in organizations. The purpose of the paper is to examine the debate on how diversity...

    Provided By University of Southern Queensland

  • White Papers // Mar 2010

    Piecemeal: A Formal Collaborative Editing Technique Guaranteeing Correctness

    While collaboration on documents has been supported for several decades by a variety of systems and tools, in recent months a renewed interest is apparent through the appearance of new collaborative editors and applications. Some of these distributed groupware systems are plug-ins for standalone word processors, while others have a...

    Provided By University of Southern Queensland

  • White Papers // Dec 2009

    Shoulder-Surfing Safe Login in a Partially Observable Attacker Model

    Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: the attacker fully observes the entire input and output of a login procedure, the attacker only partially observes the input and output. Login methods secure in the fully...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Service Re-Routing for Service Network Graph: Efficiency, Scalability and Implementation

    The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Empirical Examination of Mobile Ad Hoc Routing Protocols on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great potential of being deployed in many places where traditional wired or wireless networks are not feasible. But they have also many new challenges more than other wireless networks. These challenges include the design of embedded intelligent sensors and wireless networking technology, ie. Routing protocols...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Institutionalism as a Lens to Examine ITIL Adoption and Diffusion

    IT Service management standards such as the IT Infrastructure Library (ITIL) are of increasing importance to organisations around the globe. Although the actual number of organizations adopting ITIL is not known, there are many indicators of the growing awareness and adoption. For example, there are now 53 national chapters of...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Artificial Intelligence To Select The Optimal E-CRM Based Business Needs

    These days, business circumstances are changing rapidly because of information technology development and the spread of the Internet. Thus, it is important to develop Customer Relationship Management (CRM). CRM can satisfy customer needs that are becoming more complex. In addition, companies prefer existing customers to new customers because acquiring new...

    Provided By University of Southern Queensland

  • White Papers // Aug 2010

    Linear Model of Adapting Frame Size in DFSA of Passive GEN2 RFID Systems

    Low costs of passive UHF RFID tags, as well as their simplicity makes them appropriate for the localization and tracking services in today's fast-moving, information rich trading networks. However, a few disadvantages of passive RFID technology performances, as a reading range of passive tags and high collision rate during RFID...

    Provided By University of Southern Queensland

  • White Papers // Dec 2009

    Shoulder-Surfing Safe Login in a Partially Observable Attacker Model

    Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: the attacker fully observes the entire input and output of a login procedure, the attacker only partially observes the input and output. Login methods secure in the fully...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Institutionalism as a Lens to Examine ITIL Adoption and Diffusion

    IT Service management standards such as the IT Infrastructure Library (ITIL) are of increasing importance to organisations around the globe. Although the actual number of organizations adopting ITIL is not known, there are many indicators of the growing awareness and adoption. For example, there are now 53 national chapters of...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Artificial Intelligence To Select The Optimal E-CRM Based Business Needs

    These days, business circumstances are changing rapidly because of information technology development and the spread of the Internet. Thus, it is important to develop Customer Relationship Management (CRM). CRM can satisfy customer needs that are becoming more complex. In addition, companies prefer existing customers to new customers because acquiring new...

    Provided By University of Southern Queensland

  • White Papers // Mar 2010

    Piecemeal: A Formal Collaborative Editing Technique Guaranteeing Correctness

    While collaboration on documents has been supported for several decades by a variety of systems and tools, in recent months a renewed interest is apparent through the appearance of new collaborative editors and applications. Some of these distributed groupware systems are plug-ins for standalone word processors, while others have a...

    Provided By University of Southern Queensland

  • White Papers // Jun 2010

    Integrating Diversity Management Initiatives With Strategic Human Resource Management

    Managing diversity is usually viewed in broad conceptual terms as recognizing and valuing differences among people; it is directed towards achieving organizational outcomes and reflects management practices adopted to improve the effectiveness of people management in organizations. The purpose of the paper is to examine the debate on how diversity...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Service Re-Routing for Service Network Graph: Efficiency, Scalability and Implementation

    The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Empirical Examination of Mobile Ad Hoc Routing Protocols on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great potential of being deployed in many places where traditional wired or wireless networks are not feasible. But they have also many new challenges more than other wireless networks. These challenges include the design of embedded intelligent sensors and wireless networking technology, ie. Routing protocols...

    Provided By University of Southern Queensland

  • White Papers // Jul 2010

    Corporate Intellectual Capital Disclosure In A Non-Mandatory Disclosure Regime

    The purpose of this paper is to present an overview of corporate discretionary intellectual capital reporting in Bangladesh. From a sample of 136 listed companies with Dhaka Stock Exchange and by using the content analysis with codification of data, it examines the extent of intellectual capital reporting. It is found...

    Provided By University of Southern Queensland