989 resultados para Finnish library network


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presented a novel approach to develop car following models using reactive agent techniques for mapping perceptions to actions. The results showed that the model outperformed the Gipps and Psychophysical family of car following models. The standing of this work is highlighted by its acceptance and publication in the proceedings of the International IEEE Conference on Intelligent Transportation Systems (ITS), which is now recognised as the premier international conference on ITS. The paper acceptance rate to this conference was 67 percent. The standing of this paper is also evidenced by its listing in international databases like Ei Inspec and IEEE Xplore. The paper is also listed in Google Scholar. Dr Dia co-authored this paper with his PhD student Sakda Panwai.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There have been recent calls for the field of International Business to retool its routines by becoming genuinely interdisciplinary. This paper takes such an approach by using recent advances in the fields of evolutionary economics and applying them to IB. Evolutionary economists are now viewing the economy as an actual network. Consequently, one the key analytical tools in this approach is network analysis. Some of the basic methods in network analysis are reviewed. The paper then looks at how using these tools might be of use in IB studies. In particular, it outlines fruitful research paths in the areas of globalisation and regionalisation, and the measurement of performance in multi-national firms and alliances. In each case, propositions are put forward which can be analytically tested with the use of network analysis. The paper concludes with a brief outline of a research agenda which utilises this approach in International Business studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Identifying water wastage in forms of leaks in a water distribution network of any city becomes essential as droughts are presenting serious threats to few major cities. In this paper, we propose a deployment of sensor network for monitoring water flow in any water distribution network. We cover the issues related with designing such a dedicated sensor network by considering types of sensors required, sensors' functionality, data collection, and providing computation serving as leak detection mechanism. The main focus of this paper is on appropriate network segmentation that provides the base for hierarchical approach to pipes' failure detection. We show a method for sensors allocation to the network in order to facilitate effective pipes monitoring. In general, the identified computational problem belongs to hard problems. The paper shows a heuristic method to build effective hierarchy of the network segmentation.