Search
Now showing items 131-135 of 135
Data in Depth: Web 3-D Technologies Provide New Approaches to the Presentation of Course Content
(2010)
For nearly two decades, the Web has provided the
classroom with vast, ever-expanding volumes of browseraccessible
information. As the web has evolved so too has
our desire to become more involved with the process ...
Small Business Information Security
(East Carolina University, 2012)
Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ...
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ...
Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model
(East Carolina University, 2013)
Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
Using n-grams to identify time periods of cultural influence
(East Carolina University, 2012)
An author's literary style is influenced by the cultural time period in which the author lives. The author's ideas, and the words chosen to express them, can help identify the cultural time period that most influenced the ...