Sciweavers

701 search results - page 92 / 141
» Aspects of availability
Sort
View
EJIS
2006
132views more  EJIS 2006»
14 years 12 months ago
Enacting new temporal boundaries: the role of mobile phones
This paper examines how the use of mobile phones influences the temporal boundaries that people enact in order to regulate and coordinate their work and non-work activities. We in...
Elpida Prasopoulou, Athanasia Pouloudi, Niki Pante...
IJHPCA
2008
75views more  IJHPCA 2008»
14 years 12 months ago
Towards Ultra-High Resolution Models of Climate and Weather
We present a speculative extrapolation of the performance aspects of an atmospheric general circulation model to ultra-high resolution and describe alternative technological paths...
Michael F. Wehner, Leonid Oliker, John Shalf
IJNSEC
2008
88views more  IJNSEC 2008»
14 years 12 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
IJNSEC
2008
137views more  IJNSEC 2008»
14 years 12 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
CCE
2007
14 years 12 months ago
A systematic approach to plant-wide control based on thermodynamics
In this work, a systematic approach to plant-wide control design is proposed. The method combines ingredients from process networks, thermodynamics and systems theory to derive ro...
Luis T. Antelo, Irene Otero-Muras, Julio R. Banga,...