Sciweavers

3343 search results - page 577 / 669
» Network Objects
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 6 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
PADS
2009
ACM
15 years 6 months ago
An Approach for Validation of Semantic Composability in Simulation Models
Semantic composability aims to ensure that the composition of simulation components is meaningful in terms of their expressed behavior, and achieves the desired objective of the n...
Claudia Szabo, Yong Meng Teo
TEI
2009
ACM
173views Hardware» more  TEI 2009»
15 years 6 months ago
xtel: a development environment to support rapid prototyping of "ubiquitous content"
This paper describes the "xtel" development environment for "Ubiquitous Content". Ubiquitous contents are real space applications that are embedded in day-to-d...
Satoru Tokuhisa, Takaaki Ishizawa, Yoshimasa Niwa,...
EMS
2009
IEEE
15 years 6 months ago
Simulation of a Smart Grid City with Software Agents
—In the future smart city, new information and communication technologies will enable a better management of the available resources. The future smart grid infrastructure is emer...
Stamatis Karnouskos, Thiago Nass de Holanda
COCOA
2009
Springer
15 years 6 months ago
Recoverable Robust Timetables on Trees
In the context of scheduling and timetabling, we study a challenging combinatorial problem which is very interesting for both practical and theoretical points of view. The motivati...
Gianlorenzo D'Angelo, Gabriele Di Stefano, Alfredo...