Sciweavers

15 search results - page 3 / 3
» hicss 2012
Sort
View
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
12 years 6 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
HICSS
2012
IEEE
251views Biometrics» more  HICSS 2012»
12 years 6 months ago
Topology Skewing for Improved Route Selection in Wireless Multi-hop Networks
—The selection of a path in a network from one node to another is performed by a routing protocol, often using the shortest path approach. However, it has been shown that in wire...
Winston Khoon Guan Seah, Alvin C. Valera, Pius W. ...
HICSS
2012
IEEE
308views Biometrics» more  HICSS 2012»
12 years 6 months ago
Understanding Smart Cities: An Integrative Framework
Making a city “smart” is emerging as a strategy to mitigate the problems generated by the urban population growth and rapid urbanization. Yet little academic research has spar...
Hafedh Chourabi, Taewoo Nam, Shawn Walker, Jos&eac...
HICSS
2012
IEEE
323views Biometrics» more  HICSS 2012»
12 years 6 months ago
The Manufacture of Potable Water: Case Analyses of Electric System Alternatives
Potable water within significant areas of the nations of the Arabian Gulf region is most frequently manufactured (cogenerated) along with electricity. The most economic process ha...
Richard D. Tabors, Siddarth Nagendraprasad, Ayoob ...
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
12 years 6 months ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...