Sciweavers

GIL
2010
13 years 9 months ago
Light Competition in Chinese Cabbage/Maize Strip Intercropping Systems
: Due to drastic socio-economic changes traditional intercropping systems in China are endangered. New high yielding intercropping systems that can easily be mechanized have to be ...
Til Feike, Sebastian Munz, Simone Graeff-Hönn...
GIL
2010
13 years 9 months ago
Precision Farming also for Small Scale Farmers
: The current and future food insecurity situation of many nations has been effected by factors like global warming, population growth, bio-energy, low technology acceptance, unfav...
Walter H. Mayer
GIL
2010
13 years 9 months ago
ISOBUS - Eine systematische Betrachtung der Norm ISO 11783
Abstract: ISOBUS-Systeme sind Anwendungen der ISO 11783. Diese Norm regelt Kommunikation und Schnittstellen f
Matthias Rothmund, Martin Wodok
GIL
2010
13 years 9 months ago
Skalierbarer interorganisatorischer Informationsaustausch
: Der interorganisatorische IT-Einsatz in der Agrarwirtschaft geht mit der Herausforderung einher, Informationen an verteilten Orten zu erfassen, die sp
Nina Schönemann, Kai Fischbach
GIL
2010
13 years 9 months ago
Agribusiness 2.0
Abstract: Die Anwendung von Web 2.0 Tools innerhalb von Unternehmen erm
Jurek Hille
ESORICS
2010
Springer
13 years 9 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
CSREASAM
2010
13 years 9 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen
CSREASAM
2010
13 years 9 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
CSREASAM
2010
13 years 9 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...