نتایج جستجو برای: namely infrastructure

تعداد نتایج: 254971  

Journal: :IJSTM 2005
B. Bowonder Mohit Bansal A. Sharnitha Giridhar

This paper analyzes the application of information communication technologies for the delivery of medical services, namely telemedicine. As an attempt to understand the working of telemedicine the Aaragonda project by Apollo hospitals has been studied. Various aspects of telemedicine such as implementation and infrastructure and possible lessons from the implementation of such a project have be...

2014
Gabriele Pallotti Francesca Frontini Fabio Affè Monica Monachini Stefania Ferrari

A system for human machine interaction is presented, that offers second language learners of Italian the possibility of assessing their competence by performing a map task, namely by guiding the a virtual follower through a map with written instructions in natural language. The underlying natural language processing algorithm is described, and the map authoring infrastructure is presented.

2005
Eamonn Kenny Brian A. Coghlan George Tsouloupas Marios D. Dikaiakos John Walsh Stephen Childs David O'Callaghan Geoff Quigley

A heterogeneous implementation of the current LCG2/EGEE grid computing software is supported in the Grid-Ireland infrastructure. The porting and testing of the current software version of LCG2 is presented for different flavours of Linux, namely Red Hat 7.3, Red Hat 9 and Fedora Core 2. The GridBench micro-benchmarks developed in CrossGrid are used to compare the different platforms.

2010
Federico Pecora Marcello Cirillo Michael Brenner

In this paper we address the problem of realizing a service-providing reasoning infrastructure for proactive human assistance in intelligent environments. We propose SAM, an architecture which leverages temporal knowledge represented as relations in Allen’s interval algebra and constraint-based temporal planning techniques. SAM seamlessly combines two key capabilities for contextualized service...

Journal: :Praxis der Informationsverarbeitung und Kommunikation 2012
Seyit Ahmet Çamtepe Karsten Bsufka Leonhard Hennig Cihan Simsek Sahin Albayrak

Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by malicious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual properties. Current incidents prove that it is not sufficient a...

2006
George Morcous Amin Akhnoukh

This paper presents an application for the development of stochastic models to predict the deterioration of infrastructure facilities. The main objective is to demonstrate the capabilities and limitations of two types of models, namely state-based and time-based models, which will guide decision makers in selecting the most appropriate model type according to management needs and data availabil...

2006
A. Jamakovic H. Wang

In this paper we study an example of a complex network, namely the road infrastructure of the Netherlands. In order to investigate the factors influencing the robustness of the complex network under consideration, we calculate a set of generic topological characteristics, related to the connectivity, degree, clustering and the shortest path length. Along with these widely considered topological...

2008
Christian Schridde Matthew Smith Bernd Freisleben

A new identity-based key agreement protocol designed to operate on the network layer is presented. Endpoint addresses, namely IP and MAC addresses, are used as public keys to authenticate the communication devices involved in a key agreement, which allows us to piggyback much of the security overhead for key management to the existing network infrastructure. The proposed approach offers solutio...

2001
Ahmed M. Safwat Hossam S. Hassanein H. T. Mouftah

In this paper, we propose a novel protocol for wireless mobile ad hoc networks, which establishes a dynamic wireless mobile infrastructure. The proposed protocol, namely, the Power-Aware Virtual Base Stations (PA-VBS) protocol, mimics and maintains the operation of the conventional fixed infrastructure in cellular networks. In the PA-VBS protocol, a mobile node is elected from a set of nominees...

Journal: :Electr. Notes Theor. Comput. Sci. 2001
Lorenzo Bettini Rocco De Nicola Rosario Pugliese

Highly distributed networks have now become a common infrastructure for a new kind of wide-area distributed applications whose key design principle is network awareness, namely the ability to deal with dynamic changes of the network environment. Network-aware computing has called for new programming languages that exploit the mobility paradigm as the basic interaction mechanism. In this paper w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید