RonPub UG出版社
期刊
会议
图书
作者:Paulo Cunha , Luiz Martins , Ant�o Moura ...
来源:[J].Open Journal of Information Systems, 2015, Vol.2 (1), pp.9-28RonPub UG出版社
摘要:We propose a framework of 14 IT governance practices tailored for the electric utilities sector. They were selected and ranked as "essential", "important", or "good" by top executives and IT staff from two multi-billion dollar companies - one in Brazil and another in Europe - fro...
作者:Teruaki Hayashi , Yukio Ohsawa
来源:[J].Open Journal of Information Systems, 2015, Vol.2 (1), pp.29-40RonPub UG出版社
摘要:Social systems are changing so rapidly that it is important for humans to make decisions considering uncertainty. A scenario is information about the series of events/actions, which supports decision makers to take actions and reduce risks. We propose Action Planning for refining...
作者:Syarifah Ezdiani , Adnan Al-Anbuky
来源:[J].Open Journal of Internet Of Things, 2015, Vol.1 (1), pp.1-15RonPub UG出版社
摘要:The future of Internet of Things (IoT) is envisaged to consist of a high amount of wireless resource-constrained devices connected to the Internet. Moreover, a lot of novel real-world services offered by IoT devices are realized by wireless sensor networks (WSNs). Integrating WSN...
作者:Paulo Rosa , Ant�nio C�mara , Cristina Gouveia
来源:[J].Open Journal of Internet Of Things, 2015, Vol.1 (1), pp.16-36RonPub UG出版社
摘要:In the early nineties, Mark Weiser, a chief scientist at the Xerox Palo Alto Research Center (PARC), wrote a series of seminal papers that introduced the concept of Ubiquitous Computing. Within this vision, computers and others digital technologies are integrated seamlessly into ...
作者:Ross Malaga
来源:[J].Open Journal of Information Systems, 2015, Vol.2 (1), pp.1-8RonPub UG出版社
摘要:Over the past few years, sex trafficking has been linked to online classified ads sites such as Craigslist.com and Backpage.com. However, to date technology-based solutions have not been used to attack classified ad sites or the advertisers. This paper proposes and tests a new ap...
作者:Norhazlina Hamid , Robert Walters , Gary Wills
来源:[J].Open Journal of Cloud Computing, 2015, Vol.2 (1), pp.1-12RonPub UG出版社
摘要:Multi-core clusters have emerged as an important contribution in computing technology for provisioning additional processing power in high performance computing and communications. Multi-core architectures are proposed for their capability to provide higher performance without in...
作者:Mawahib Elbushra , Jan Lindstr�m
来源:[J].Open Journal of Databases, 2015, Vol.2 (1), pp.17-35RonPub UG出版社
摘要:Many consistency criteria have been considered in databases and the causal consistency is one of them. The causal consistency model has gained much attention in recent years because it provides ordering of relative operations. The causal consistency requires that all writes, whic...
作者:Erik Buchmann , Patrick Bradley , Klemens B�hm
来源:[J].Open Journal of Databases, 2015, Vol.2 (1), pp.1-16RonPub UG出版社
摘要:Many application domains such as surveillance, environmental monitoring or sensor-data processing need upper and lower bounds on areas that are covered by a certain feature. For example, a smart-city infrastructure might need bounds on the size of an area polluted with fine-dust,...
作者:Pakizar Shamoi , Atsushi Inoue , Hiroharu Kawanaka
来源:[J].Open Journal of Information Systems (OJIS), 2014, Vol.1 (2), pp.20--28RonPub UG出版社
摘要:Human perception of colors constitutes an important part in color theory. The applications of color science are truly omnipresent, and what impression colors make on human plays a vital role in them. In this paper, we offer the novel approach for color information representation ...
作者:Stephan Kessler , Erik Buchmann , Thorben Burghardt ...
来源:[J].Open Journal of Information Systems (OJIS), 2014, Vol.1 (1), pp.3--22RonPub UG出版社
摘要:Time series anonymization is an important problem. One prominent example of time series are energy consumption records, which might reveal details of the daily routine of a household. Existing privacy approaches for time series, e.g., from the field of trajectory anonymization, a...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×