We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Event Identification for Supply Chain Risk Management Through News Analysis by Using Large Language Models

    Event identification is important in many areas of the business world. In the supply chain risk management domain, the timely identification of risk...

    Maryam Shahsavari, Omar Khadeer Hussain, ... Pankaj Sharma in The Review of Socionetwork Strategies
    Article Open access 15 July 2024
  2. Television shows ideation, and testing with smart digital twins to advance ratings

    Generating ideas for immersive television shows is fundamental to the television industry. TV channel managers are looking to stay ahead of their...

    Jacob Hornik, Matti Rachamim in Electronic Commerce Research
    Article Open access 15 July 2024
  3. Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN

    Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT...

    S. Jeevanantham, C. Venkatesan, B. Rebekka in Telecommunication Systems
    Article 13 July 2024
  4. An enhanced energy and distance based optimized clustering and dynamic adaptive cluster-based routing in software defined vehicular network

    Software-Defined Vehicular Networks (SDVN) have been established to facilitate secure and adaptable vehicle communication within the dynamic...

    A. Sajithabegam, T. Menakadevi in Telecommunication Systems
    Article 13 July 2024
  5. A novel PLS technique for secure ESM based MIMO systems

    Multiple-input multiple-output systems with spatial modulation has evolved into an energy efficient and less complex wireless transmission system due...

    Ramaprabha Rengaraj, Gunaseelan Konganathan, Lavanya Dhamotharan Loganathan in Telecommunication Systems
    Article 11 July 2024
  6. The impact of supply chain digitalization on supply chain performance: a moderated mediation model

    Despite extensive attention that researchers and practitioners have paid to supply chain digitalization, our understanding of how to leverage supply...

    Shaobo Wei, Hua Liu, ... **ayu Chen in Information Technology and Management
    Article 11 July 2024
  7. Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model

    In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...

    Stephen McCarthy, Titiana Ertiö, ... Nina Kahma in Information Systems Frontiers
    Article Open access 08 July 2024
  8. Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse

    There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...

    Nannan **, Juan Chen, ... Juho Hamari in Information Systems Frontiers
    Article Open access 08 July 2024
  9. DOCA: a UAV-assisted multi-hop D2D resource allocation scheme for 5G and beyond using machine learning

    Device-to-Device (D2D) relayed communication helps in extending the coverage range of cellular networks. Relay devices support multi-hop D2D...

    Pradip Kumar Barik, Ashu Dayal Chaurasiya, Raja Datta in Telecommunication Systems
    Article 08 July 2024
  10. A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes

    Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...

    Shabnam FakhrHosseini, Chaiwoo Lee, ... Joseph Coughlin in Information Systems Frontiers
    Article Open access 08 July 2024
  11. An anonymous broadcasting system with accountability based on group signatures

    Advanced anonymous communication schemes have been proposed to protect the privacy of network users, enabling them to communicate anonymously on the...

    Huan Ye, Fagen Li in Telecommunication Systems
    Article 07 July 2024
  12. Introduction: online grocery shop** – current and future challenges and opportunities

    Philipp Brüggemann, Luis F. Martinez, ... J. Christopher Westland in Electronic Commerce Research
    Article Open access 06 July 2024
  13. Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset

    As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as...

    Klein Galit, Assadi Djamchid, Zwilling Moti in Information Systems Frontiers
    Article 06 July 2024
  14. Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering

    We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality...

    Niels Bylois, Frank Neven, Stijn Vansummeren in Information Systems Frontiers
    Article 05 July 2024
  15. Statistical analysis and characterization of signaling and user traffic of a commercial multi-band LTE system

    The fourth-generation (4 G) cellular network is currently the dominant mobile technology used worldwide. The analysis of the network behavior can...

    Cesar Vargas Anamuro, Alberto Blanc, Xavier Lagrange in Telecommunication Systems
    Article 05 July 2024
Did you find what you were looking for? Share feedback.