Sciweavers

438 search results - page 45 / 88
» Defending Critical Infrastructure
Sort
View
COOPIS
2004
IEEE
14 years 17 days ago
Cooperative Artefacts
In this position paper we introduce Cooperative Artefacts, physical objects that embed sensing, communication, computation and actuation in physical objects. In contrast to many ot...
Hans-Werner Gellersen
CISSE
2008
Springer
13 years 10 months ago
Network Topology Impact on Influence Spreading
-- Networks composed of large number of nodes interacting in structured ways such as power grids, communication networks, social networks or market networks are critical port of th...
Sasho Gramatikov, Dimitar Trajanov, Ljupco Kocarev...
CONEXT
2008
ACM
13 years 10 months ago
Supporting delay-intolerant applications
Reliable transport protocols that offer low per-packet delays are becoming increasingly important, particularly for critical infrastructure services. Forward error correction (FEC...
Shufeng Huang
MKWI
2008
137views Business» more  MKWI 2008»
13 years 10 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann
ECIS
2001
13 years 10 months ago
The role of knowledge management in moving to a customer-focused organisation
Organisations are becoming increasingly more reliant on leveraging their information and knowledge to gain competitive advantage. The creation, storage and dissemination of inform...
Graeme G. Shanks, Emily Tay