Journal of Symbolic Computation ECGK An efficient clustering scheme for group key management in MANE_第1页
Journal of Symbolic Computation ECGK An efficient clustering scheme for group key management in MANE_第2页
Journal of Symbolic Computation ECGK An efficient clustering scheme for group key management in MANE_第3页
Journal of Symbolic Computation ECGK An efficient clustering scheme for group key management in MANE_第4页
Journal of Symbolic Computation ECGK An efficient clustering scheme for group key management in MANE_第5页
已阅读5页,还剩11页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Activity-based costing user satisfaction and type of system: A research noteThe British Accounting Review, Volume 43, Issue 1, March 2011, Pages 65-72Richard H. Pike, Mike E. Tayles, Nur Naha Abu MansorShow preview| Related articles|Related reference work articles Purchase$ 31.50127A modified binary

2、 tree codification of drainage networks to support complex hydrological modelsOriginal Research ArticleComputers & Geosciences, Volume 36, Issue 11, November 2010, Pages 1427-1435Tiejian Li, Guangqian Wang, Ji ChenShow preview| Related articles|Related reference work articles Purchase$ 19.95128A pro

3、cess-oriented multi-agent system development approach to support the cooperation-activities of concurrent new product developmentOriginal Research ArticleComputers & Industrial Engineering, Volume 57, Issue 4, November 2009, Pages 1363-1376Yeh-Chun Juan, Chao Ou-Yang, Jiun-Shiung LinShow preview| Re

4、lated articles|Related reference work articles Purchase$ 37.95129Collaborative knowledge managementA construction case studyOriginal Research ArticleAutomation in Construction, Volume 18, Issue 7, November 2009, Pages 894-902Bhargav Dave, Lauri KoskelaClose preview| Related articles|Related referenc

5、e work articles AbstractAbstract | Figures/TablesFigures/Tables | ReferencesReferences AbstractDue to the new threats and challenges faced by the construction industry today, construction companies must seek new solutions in order to remain ahead of the competition. Knowledge has been identified to

6、be a significant organisational resource, which if used effectively can provide competitive advantage. A lot of emphasis is being put on how to identify, capture and share knowledge in todays organisations. It has been argued over the years that due to the fragmented nature of the construction indus

7、try and ad-hoc nature of the construction projects, capture and reuse of valuable knowledge gathered during a construction project pose a challenge. As a result critical mistakes are repeated on projects and construction professionals have to keep “reinventing the wheel”. Given the nature of constru

8、ction projects, collaborative knowledge management seems to be the most appropriate solution to capture project based knowledge. Information and communication technologies offer a number of solutions to implement collaborative knowledge management solutions. This paper discusses a range of these sol

9、utions and presents a case study where a collaborative knowledge management solution is implemented across a multi functional construction company. The work presented in the case study was carried out while the first author was employed by the case study organisation. A social web application was im

10、plemented to solve a particular knowledge sharing problem within the organisations concrete pumping business. The new solution provided an effective and simple way to create knowledge by taking employees ideas through an iterative cycle of discussion.Article Outline1. Introduction2. Knowledge manage

11、ment in organisations 2.1. Knowledge transfer and creation2.2. Types of knowledge management systems2.3. Classification of knowledge work3. ICT solutions for collaborative knowledge management 3.1. Web 2.04. Knowledge management in construction 4.1. Nature of the industry4.2. A case of knowledge man

12、agement in construction 4.2.1. Enable knowledge transfer4.2.2. Capture and reuse project knowledge4.2.3. Enable better communication amongst stakeholders5. Case study 5.1. Company background5.2. Problem discussion5.3. Methodology for solution development 5.3.1. Requirements capture 5.3.1.1. Wiki5.3.

13、1.2. Internet forum5.3.2. Implementation5.3.3. Post implementation review 5.3.3.1. Initial review5.3.3.2. Six month review6. Discussion7. ConclusionReferencesPurchase$ 41.95130Using mobile learning to increase environmental awarenessOriginal Research ArticleComputers & Education, Volume 52, Issue 2,

14、 February 2009, Pages 381-389Huseyin Uzunboylu, Nadire Cavus, Erinc ErcagClose preview| Related articles|Related reference work articles AbstractAbstract | Figures/TablesFigures/Tables | ReferencesReferences AbstractMobile learning or m-learning, a relatively new concept, has attracted the interest

15、of educators, researchers, and companies developing learning systems and instructional materials. This study investigated the use of integrating use of mobile technologies, data services, and multimedia messaging systems to increase students use of mobile technologies and to develop environmental aw

16、areness. Data was collected using “usefulness of mobile learning systems” questionnaire from a sample consisting of 20 male and 21 female undergraduates enrolled in computer education and instructional technologies classes at the Near East University in North Cyprus. Students voluntarily participate

17、d in a six-week program using mobile telephones to transmit photographs of local environmental blights and to exchange pictures and observations. Participants learned ways to maintain clean environments and increased their awareness of environmental concerns. Responses on questionnaire differed sign

18、ificantly based upon gender and grade.Article Outline1. Introduction2. Theoretical foundation 2.1. Emergence of ML2.2. Gender and computer mediated communication2.3. W/H devices and ML2.4. Environmental awareness3. Purpose of the study4. Method 4.1. Participants4.2. Instrument4.3. Procedure4.4. Data

19、 analysis5. Results and discussion 5.1. Mobile learning and environmental awareness5.2. Gender5.3. Grade6. Conclusions 6.1. RecommendationsAcknowledgementsReferencesPurchase$ 24.95131LotusNet: Tunable privacy for distributed online social network servicesOriginal Research ArticleComputer Communicati

20、ons, In Press, Corrected Proof, Available online 19 December 2010Luca Maria Aiello, Giancarlo RuffoClose preview| Related articles|Related reference work articles AbstractAbstract | Figures/TablesFigures/Tables | ReferencesReferences AbstractThe evolution of the role of online social networks in the

21、 Web has led to a collision between private, public and commercial spheres that have been inevitably connected together in social networking services since their beginning. The growing awareness on the opaque data management operated by many providers reveals that a privacy-aware service that protec

22、ts user information from privacy leaks would be very attractive for a consistent portion of users. In order to meet this need we propose LotusNet, a framework for the development of social network services relying on a peer-to-peer paradigm which supports strong user authentication. We tackle the tr

23、ade-off problem between security, privacy and services in distributed social networks by providing the users the possibility to tune their privacy settings through a very flexible and fine-grained access control system. Moreover, our architecture is provided with a powerful suite of high-level servi

24、ces that greatly facilitates custom application development and mash up.Article Outline1. Introduction2. Related work 2.1. Peer-to-peer OSNs2.2. Privacy solutions for centralized OSNs2.3. Our direction3. OSN requirements 3.1. Privacy requirements 3.1.1. Confidentiality3.1.2. Ownership privacy3.1.3.

25、Social interactions privacy3.1.4. Activity privacy3.2. Security requirements 3.2.1. Channel authentication3.2.2. Data integrity and authenticity3.2.3. Non-repudiation3.3. Service requirements 3.3.1. Content availability3.3.2. Flexible communications3.3.3. Easy integration3.3.4. Search facilities3.3.

26、5. Reputation management3.4. The wall, the fence, the garden4. DHT layer 4.1. Secure design: raise the fences4.2. API5. Architecture 5.1. Basic interaction and integration5.2. Building the social graph: access control and contact discovery 5.2.1. Implementation5.3. Tuning the privacy level: lift up

27、the walls6. Services: grow the garden 6.1. Notifications6.2. Folksonomic content search6.3. Reputation management6.4. On storage service7. Crawling attack8. ConclusionsAcknowledgementsReferencesPurchase$ 41.95132Characterization of the busy-hour traffic of IP networks based on their intrinsic featur

28、esOriginal Research ArticleComputer Networks, In Press, Uncorrected Proof, Available online 2 March 2011Jos Luis Garca-Dorado, Jos Alberto Hernndez, Javier Aracil, Jorge E. Lpez de Vergara, Sergio Lopez-BuedoClose preview| Related articles|Related reference work articles AbstractAbstract | Figures/T

29、ablesFigures/Tables | ReferencesReferences AbstractInternet traffic measurements collected during the busy hour constitute a key tool to evaluate the operation of networks under the heaviest-load case scenarios, and further provide a means to network dimensioning and capacity planning. In this light

30、, this study provides a throughout analysis of the busy-hour traffic measurements of an extensive set of universities, regional networks and Internet exchange points collected from the Spanish Research and Education Network, RedIRIS. After showing that the traffic volumes observed in the busy hour o

31、ver time can be modeled by a white Gaussian process, this work takes one step further and examines the influence of the networks intrinsic features, mainly population size and access link capacity, on the busy-hour traffic. Well-known statistical methodologies, such as ANOVA and ANCOVA, show that th

32、e network size in terms of number of users justifies most of the busy-hour traffic information. We further provide a linear-regression model that adjusts the amount of traffic that each network user contributes to the busy-hour traffic mean values, with a direct application to the problem of link ca

33、pacity planning of IP networks.Article Outline1. Introduction2. Preliminaries 2.1. Related work and contributions2.2. Definition of busy-hour traffic2.3. Measurement set description3. Characterization and dynamics of the busy-hour traffic process 3.1. Gaussian marginal distribution3.2. Autocorrelati

34、on experiments3.3. Distribution of the busy-hour times3.4. Discussion4. Factor analysis of access link capacity and population size 4.1. Effect of access link capacity: ANOVA4.2. Combined effect of the access link capacity and population size: ANCOVA4.3. Focusing on the population size: linear regre

35、ssion4.4. Validation model4.5. On the relationship between heavy-hitters and population size5. Summary and conclusionsAcknowledgementsReferencesVitaePurchase$ 31.50133The state of technological sophistication and the need for new specialised tertiary degrees in food servicesOriginal Research Article

36、International Journal of Hospitality Management, Volume 28, Issue 1, March 2009, Pages 71-77Svetlana RodgersClose preview| Related articles|Related reference work articles AbstractAbstract | Figures/TablesFigures/Tables | ReferencesReferences AbstractHospitality management graduates have limited ins

37、ights into latest operational/technological concepts such as Industrial Cuisine, Molecular Gastronomy and Personalised Nutrition. In fact, hard or equipment-based technologies support the two major strategic options, cost leadership and differentiation. At present, suppliers and governments, but not

38、 operators, drive research and development in the field. In the education sector, new specialised curricula incorporating pathways stemming from natural science are needed to equip future graduates with cutting edge skills for innovation at product, process and system levels. The research-teaching c

39、ycle can be strengthened by sharing degrees with departments of science and engineering across tertiary institutions.Article Outline1. Introduction2. Should the food service industry be satisfied?3. The role of technology4. Who drives science-based research?5. New specialised degrees6. ConclusionAck

40、nowledgementsReferencesPurchase$ 41.95134A survey of the application of fuzzy set theory in production and operations management: 19982009Original Research ArticleInternational Journal of Production Economics, Volume 129, Issue 1, January 2011, Pages 157-168Bo K. Wong, Vincent S. LaiClose preview| R

41、elated articles|Related reference work articles AbstractAbstract | Figures/TablesFigures/Tables | ReferencesReferences AbstractThe objectives of this research are to identify the research trends in and publication outlets for the applications of the fuzzy set theory technique in production and opera

42、tions management (POM). The major findings indicate that (1) the most popular applications are capacity planning, scheduling, inventory control, and product design, (2) some application areas make more use of particular types of fuzzy techniques, (3) the percentage of applications that address semi/

43、unstructured types of POM problems is increasing, (4) the most common technologies integrated with the fuzzy set theory technique are genetic/evolutionary algorithms and neural networks, and (5) the most popular development tool is C Language and its extension. Our survey confirms several research t

44、rends, some of which are unexpected and some of which contradict previous findings.Article Outline1. Introduction2. Data collection method3. Classification categories4. Results5. Discussion 5.1. Publication5.2. Applications and methods 5.2.1. Capacity planning5.2.2. Inventory control5.2.3. Product d

45、esign5.2.4. Scheduling5.2.5. Facilities layout5.2.6. Maintenance5.2.7. Quality control5.2.8. Distribution5.2.9. Process design5.2.10. Project management5.2.11. Facilities location5.2.12. Environment5.2.13. Process choice and quality planning5.2.14. Forecasting5.2.15. Purchasing5.3. Decision type5.4.

46、 AI technology integration5.5. Development tool6. Limitations of the study7. ConclusionsReferencesPurchase$ 39.95135The development of technology infrastructure in Portugal and the need to pull innovation using proactive intermediation policiesOriginal Research ArticleTechnovation, Volume 29, Issue

47、1, January 2009, Pages 23-34Manuel LaranjaClose preview| Related articles|Related reference work articles AbstractAbstract | Figures/TablesFigures/Tables | ReferencesReferences AbstractIt was not until the 1980s that governments in Portugal began to develop a national technology infrastructure (TI).

48、 Although there is no general accepted definition of what constitutes a TI, we define it as comprising different kinds of public, semi-public and private centres and institutes of research and technology. Following a latecomer supply side technology-push rationale and using European structural funds

49、, successive governments in Portugal invested in building a comprehensive TI-system. However, the development of such system overlooked the support needs of the enterprise sector. Hence, questions are now being raised as to whether current policies and structures of support to technology transfer an

50、d innovation are relevant and operating effectively. This, in turn, is generating a need to consider new policies oriented to stimulate demand-pull and the use of the capabilities already existent. This paper contributes to assess the outcomes of the efforts undertaken in Portugal to build an effect

51、ive TI-system to support innovation and technology transfer and suggests new demand-oriented policies.Article Outline1. Introduction2. A conceptual discussion about technology, technology transfer and TI 2.1. What is technology transfer?2.2. A working definition of TI3. The development of TI 3.1. TI

52、 in Europe3.2. Proactive intermediation schemes. How to stimulate effective linkages?3.3. Contrasting the development of TI in Portugal4. The effectiveness of Portuguese TI 4.1. Large PREs: the cases of LNETI and LNEC4.2. Sectoral technology associations4.3. University interface institutes and assoc

53、iations5. The view of local firms on the available TI6. Final issues for discussion: How to stimulate demand from SMEs?ReferencesPurchase$ 31.50136Discovering the campus together: A mobile and computer-based learning experienceOriginal Research ArticleJournal of Network and Computer Applications, In

54、 Press, Accepted Manuscript, Available online 12 March 2011Mar Prez-Sanagustn, Gustavo Ramirez-Gonzalez, Davinia Hernndez-Leo, Mario Muoz-Organero, Patricia Santos, Josep Blat, Carlos Delgado KloosShow preview| Related articles|Related reference work articles Purchase$ 39.95137Logisnet: A tool for m

55、ultimethod, multiple soil layers slope stability analysisOriginal Research ArticleComputers & Geosciences, Volume 35, Issue 5, May 2009, Pages 1007-1016G. Legorreta Paulin, M. BursikShow preview| Related articles|Related reference work articles Purchase$ 19.95138Systems integration and collaboration

56、 in architecture, engineering, construction, and facilities management: A reviewOriginal Research ArticleAdvanced Engineering Informatics, Volume 24, Issue 2, April 2010, Pages 196-207Weiming Shen, Qi Hao, Helium Mak, Joseph Neelamkavil, Helen Xie, John Dickinson, Russ Thomas, Ajit Pardasani, Henry XueShow preview| Related articles|Related reference work articles Purchase$ 41.95139An industry approach to shared, cross-organisational engineering change handlingThe road towards standards for

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论