Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   5  
      Optimization ProblemNetwork computingWireless SensorWireless Sensor Network
    • by 
    •   12  
      Civil EngineeringRemote SensingRadial Basis FunctionMarine Structures
    • by 
    •   19  
      Computer ScienceDistributed ComputingParallel ProgrammingComputer Networks
    • by 
    •   16  
      Object Oriented ProgrammingPhysicsParallel ProgrammingMonte Carlo Simulation
Abstract: Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to... more
    • by 
    •   5  
      Computer ScienceInformation SecurityNetwork computingUser authentication
    • by 
    •   18  
      Computer ScienceInformation TechnologyComputer NetworksNetwork Management
This article offers expert opinion on two Internet of Things (IoT) perspectives. The first is a research agenda for the IoT to ensure the development of a trusted, secure, reliable, and interoperable net-centric computing environment. The... more
    • by 
    •   6  
      Human Computer InteractionSemanticsThe Internet of ThingsNetwork computing
    • by 
    •   3  
      Human GeographyInformation and Communication technologyNetwork computing
Purpose – This paper sets out the arguments for the use of social media as a tool for learning in the workplace. Design/methodology/approach – Not applicable – viewpoint paper Findings – Social media can play a valuable role in both... more
    • by 
    •   8  
      Informal LearningSocial MediaWorkplace LearningExperiential Learning
    • by 
    •   9  
      GeologyGeophysicsPower PlantNumerical Simulation
    • by 
    •   3  
      File SharingNetwork computingDistributed Mutual Exclusion
... Al-Sharqiyah Al-Dakhiliah Al Wusta UAE KSA Al Dhahirah Manah Alkamil JBB Ali Sur OMIFCO Mudhirib Mudaybi Adam Nizwa Bahla Nahada PDO Ibri Alhayl Dank Mhadah (Alwasit) Bureimi Wadi Al Jizzi Liwa Shinas Sohar SIS SPS SIA-1 SRC Saham... more
    • by  and +1
    •   7  
      Power PlantComputer SimulationNetwork computingNon-superconducting Fault Current Limiter
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imper- ative that these... more
    • by 
    •   5  
      Wireless Sensor Network SecuritySystem DesignSensor NetworkNetwork computing
    • by  and +2
    •   16  
      Ubiquitous ComputingComputer NetworksSensorPervasive Computing
    • by  and +1
    •   7  
      Information and Communication technologyCommunication TechnologyNew TechnologyOlder people
    • by 
    •   19  
      MathematicsBehaviorWorking MemoryReading
    • by 
    •   15  
      MacrophagesHeart FailureCompetitive strategyComputer Simulation
    • by 
    •   16  
      EducationHigher EducationQualitative ResearchAttitude change
    • by 
    •   7  
      PsychologyCognitive ScienceCognitive DissonanceAttitude change
    • by 
    •   9  
      Mechanical EngineeringMechatronicsFlexible LearningManufacturing Engineering
▪   We explore the extent to which neocortical circuits generalize, i.e., to what extent can neocortical neurons and the circuits they form be considered as canonical? We find that, as has long been suspected by cortical neuroanatomists,... more
    • by 
    •   18  
      NeurosciencePsychologyCognitive ScienceMedicine
    • by  and +1
    •   19  
      MathematicsBehaviorWorking MemoryReading
    • by 
    •   18  
      AlgebraComputer NetworksPattern RecognitionNeural Networks
    • by 
    •   13  
      Computer VisionRemote SensingControlMulti Agent System
    • by 
    •   2  
      Network computingComputer
    • by 
    •   6  
      Internet SecurityMobile DeviceSmart CardNetwork computing
    • by 
    •   19  
      MultimediaEmbedded SystemsMobile CommunicationPrototyping
    • by 
    •   12  
      Shape ModelingPublic DomainUser InterfaceGraphic User Interface Design
    • by 
    •   2  
      Network computingSwitched Capacitor Filters
    • by 
    •   12  
      Earth SciencesThermodynamicsPhase equilibriaPhysical sciences
    • by 
    •   2  
      Network computingReliability Modeling
Network security issues and game exploits can undermine the gameplay experience of networked games. With this in mind, this work tries to draw attention of the academic community to the issue and, through a vast bibliography, present: why... more
    • by 
    •   3  
      Network SecurityNetwork computingComputer Game
    • by 
    •   10  
      Computer ArchitectureComputer NetworksCryptographyOPERATING SYSTEM
    • by 
    •   17  
      Optical ImagingVisual CortexBrain MappingEmergency Response
    • by 
    •   5  
      Distributed ComputingWireless NetworkNetwork computingEnergy Cost
    • by 
    •   7  
      Distributed ComputingBroadcastingMobile Ad Hoc NetworkAd Hoc Networks
The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers... more
    • by 
    •   17  
      GeneticsComputer SecurityMiddlewareAnimal Husbandry
A common problem faced by institutions concerns the limited availability of expensive robotics and control equipment, with which students in the educational program can work, in order to acquire valuable 'hands on' experience. The... more
    • by 
    •   12  
      Motor ControlComputer SoftwareFlexible LearningVirtual Environment
The paper would discuss the possibilities of using cloud computing as a solution to expand work efficiency at Taiz university (TU) Computer Center and Information Technology (CCIT) labs, these Labs equipped with hardware and software... more
    • by 
    • Network computing
    • by 
    •   15  
      EngineeringSmart GridRenewable Energy SystemsPower Plant
    • by 
    •   6  
      MathematicsCorrelationGeomatic EngineeringNetwork computing
    • by 
    •   7  
      Strategic PlanningLevel Of Detail (LOD)Learning EnvironmentNetwork computing
    • by 
    •   7  
      Human GeographySocial ComputingVolunteered Geographic InformationUser Generated Content
    • by 
    • Network computing
    • by 
    •   10  
      Reconfigurable ComputingMobile TechnologyHardware/Software Co-DesignProceedings
    • by 
    •   6  
      Energy ConservationMultidisciplinaryDistributed ProcessingReal Time
    • by 
    •   11  
      SchedulingQueueing theoryProbabilityProbability Distribution & Applications
    • by 
    •   7  
      Distributed DatabaseComputer NetworkQuality of ServiceCase Study
    • by 
    •   10  
      Educational ResearchComputer NetworksComputer Supported Collaborative LearningContent Analysis