Narrow your search
Listing 1 - 10 of 139 << page
of 14
>>
Sort by

Book
Emerging Communications for Wireless Sensor Networks
Authors: ---
ISBN: 9535159720 953307082X Year: 2011 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide.


Book
Communications and networking
Author:
ISBN: 9535159534 9533071141 Year: 2010 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book "Communications and Networking" focuses on the issues at the lowest two layers of communications and networking and provides recent research results on some of these issues. In particular, it first introduces recent research results on many important issues at the physical layer and data link layer of communications and networking and then briefly shows some results on some other important topics such as security and the application of wireless networks. In summary, this book covers a wide range of interesting topics of communications and networking. The introductions, data, and references in this book will help the readers know more abut this topic and help them explore this exciting and fast-evolving field.


Book
Automatisierte, minimalinvasive Sicherheitsanalyse und Vorfallreaktion für industrielle Systeme
Author:
Year: 2022 Publisher: Karlsruhe : KIT Scientific Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Automated defense and prevention measures designed to protect industrial automation and control systems often compromise their real-time processing, resilience and redundancy. Therefore, they need to be performed as non-invasively as possible. Nevertheless, particularly minimally invasive security analysis and incident response are still poorly researched. This work presents solutions based on new semantic- and SDN-based approaches to some of the most important problems in these areas.


Book
Datenschutz in sozialen Netzwerken in Europa, Deutschland und Chile : Eine rechtsvergleichende Untersuchung zum europaischen, deutschen und chilenischen Recht
Author:
ISBN: 3631725795 3631725523 3631725809 Year: 2017 Publisher: Frankfurt am Main, [Germany] : PL Academic Research,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Der Autor untersucht, ob geltendes Recht in Europa, Deutschland und Chile personenbezogene Daten in sozialen Netzwerken hinreichend vor Missbrauch schützt. Hierbei widmet er sich vertieft dem Vergleich deutscher und europäischer Regelungen mit der Rechtslage in Chile, zwei sehr unterschiedlichen Rechtsordnungen und technologisch komplizierten Sachverhalten. Der Fokus des Buches liegt auf der Untersuchung des Datenschutzes speziell in sozialen Netzwerken und auf der Beleuchtung der internationalen Dimension dieses Phänomens. So leistet der Autor einen rechtswissenschaftlichen Beitrag mit grenzüberschreitendem Blickwinkel zu dem Thema Datenschutz.


Book
Sustainable Education and Social Networks
Author:
ISBN: 3036570284 3036570292 Year: 2023 Publisher: Basel : MDPI,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Social Networks with Rich Edge Semantics
Authors: ---
ISBN: 1315390604 1315390620 1315390612 1138032433 0367573253 Year: 2017 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Social Networks with Rich Edge Semantics introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the book shows how to model the social network using spectral embedding. It also shows how to compose the techniques so that multiple edge semantics can be modeled together, and the modeling techniques are then applied to a range of datasets.FeaturesIntroduces the reader to difficulties with current social network analysis, and the need for richer representations of relationships among nodes, including accounting for intensity, direction, type, positive/negative, and changing intensities over timePresents a novel mechanism to allow social networks with qualitatively different kinds of relationships to be described and analyzedIncludes extensions to the important technique of spectral embedding, shows that they are mathematically well motivated and proves that their results are appropriateShows how to exploit embeddings to understand structures within social networks, including subgroups, positional significance, link or edge prediction, consistency of role in different contexts, and net flow of properties through a nodeIllustrates the use of the approach for real-world problems for online social networks, criminal and drug smuggling networks, and networks where the nodes are themselves groupsSuitable for researchers and students in social network research, data science, statistical learning, and related areas, this book will help to provide a deeper understanding of real-world social networks."--Provided by publisher.


Book
Netzwerke und Gründungen von Unternehmen durch Frauen
Authors: --- ---
ISBN: 3428517199 3428117190 Year: 2004 Publisher: Berlin : Duncker & Humblot,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hauptbeschreibung Netzwerkbeziehungen tragen dazu bei, dass sich neue Unternehmen am Markt legitimieren. Sie ermöglichen einen raschen und oft exklusiven Informationsaustausch und leisten emotionale wie technische Unterstützung, insbesondere auch in der Gründungsphase eines Unternehmens. Gerade in den neunziger Jahren hat sich in Deutschland eine Vielzahl neuer - regionaler wie nationaler - Netzwerke für berufstätige und selbständige Frauen gegründet, zusätzlich zu den Wirtschafts- und Berufsverbänden. Vor diesem Hintergrund untersuchen Friederike Welter, Ursula Ammon und Lutz Trett


Book
Organizational network analysis : auditing intangible resources
Author:
ISBN: 1000730182 0367408945 9780367408947 9781000730425 1000730425 9781000730180 9780367370077 0367370077 Year: 2020 Publisher: New York : Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The integrated meta-model for organizational resource audit is a consistent and comprehensive instrument for auditing intangible resources and their relations and associations from the network perspective. This book undertakes a critically important problem of management sciences, poorly recognized in literature although determining the current and future competitiveness of enterprises, sectors and economies. The author notes the need to introduce a theoretical input, which is manifested by the meta-model. An expression of this treatment is the inclusion of the network as a structure of activities, further knowledge as an activity, and intangible assets as intellectual capital characterized by a structure of connections. The case study presented is an illustration of the use of network analysis tools and other instruments to identify not only the most important resources, tasks or actors, as well as their effectiveness, but also to connect the identified networks with each other. The author opens the field for applying her methodology, revealing the structural and dynamic features of the intangible resources of the organization. The novelty of the proposed meta-model shows the way to in-depth applications of network analysis techniques in an intra-organizational environment.


Book
Valoriser la science : les partenariats des start-up technologiques
Author:
ISBN: 2356710981 2356712976 2911256816 Year: 2012 Publisher: Paris Presses des Mines

Loading...
Export citation

Choose an application

Bookmark

Abstract

L’innovation ouverte exige des échanges permanents entre science et marché ; les start-up issues de la recherche en sont un véhicule privilégié. Si la création de ces « jeunes pousses » valorisant des travaux scientifiques a été fortement encouragée par les politiques publiques depuis une dizaine d’années, on sait peu de choses des effets qu’elles induisent sur leurs marchés. Que valent-elles ? Comment comprendre leur rôle et saisir leur impact ? Qu’apportent-elles aux entreprises avec lesquelles elles coopèrent ? Cet ouvrage propose une approche originale : pour rendre compte de la portée de ces start-up, il traque les réseaux d’innovation qu’elles construisent et animent. Il analyse les formes et les effets des partenariats avec des start-up par une double perspective : l’analyse statistique des innovations produites dans un vaste échantillon de collaborations inter-firmes et l’observation fine des pratiques d’évaluation mises en œuvre par les entreprises partenaires. L’enquête met en lumière la dynamique exploratoire de ces partenariats, la diversité des résultats qu’ils génèrent et la spécificité des dispositifs sur lesquels ils s’appuient. L’ouvrage intéressera aussi bien les chercheurs en sciences de gestion et en sociologie que les acteurs publics impliqués dans la valorisation de la recherche et les acteurs industriels qui sont amenés à coopérer avec des start-up technologiques.


Book
Intrusion detection systems
Author:
ISBN: 9535159887 9533071672 Year: 2011 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.

Listing 1 - 10 of 139 << page
of 14
>>
Sort by