Sciweavers

438 search results - page 45 / 88
» Defending Critical Infrastructure
Sort
View
92
Voted
COOPIS
2004
IEEE
15 years 4 months ago
Cooperative Artefacts
In this position paper we introduce Cooperative Artefacts, physical objects that embed sensing, communication, computation and actuation in physical objects. In contrast to many ot...
Hans-Werner Gellersen
127
Voted
CISSE
2008
Springer
15 years 2 months ago
Network Topology Impact on Influence Spreading
-- Networks composed of large number of nodes interacting in structured ways such as power grids, communication networks, social networks or market networks are critical port of th...
Sasho Gramatikov, Dimitar Trajanov, Ljupco Kocarev...
73
Voted
CONEXT
2008
ACM
15 years 2 months ago
Supporting delay-intolerant applications
Reliable transport protocols that offer low per-packet delays are becoming increasingly important, particularly for critical infrastructure services. Forward error correction (FEC...
Shufeng Huang
89
Voted
MKWI
2008
137views Business» more  MKWI 2008»
15 years 1 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann
76
Voted
ECIS
2001
15 years 1 months ago
The role of knowledge management in moving to a customer-focused organisation
Organisations are becoming increasingly more reliant on leveraging their information and knowledge to gain competitive advantage. The creation, storage and dissemination of inform...
Graeme G. Shanks, Emily Tay