935 resultados para ERP systems introduction


Relevância:

40.00% 40.00%

Publicador:

Resumo:

This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

225 p. : il. Texto en español con conclusiones en inglés

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Ridoux, O. and Ferr?, S. (2004) Introduction to logical information systems. Information Processing & Management, 40 (3), 383-419. Elsevier

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, an introduction is provided to some of the components of China's transport system. The authors include the urban rail transit systems, the highway transport systems and its competition for China's railways and the reform of China's railway industry. This is the second of two papers on the situation of rail transport in China.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
• Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The idea behind creating this special issue on real world applications of intelligent tutoring systems was to bring together in a single publication some of the most important examples of success in the use of ITS technology. This will serve as a reference to all researchers working in the area. It will also be an important resource for the industry, showing the maturity of ITS technology and creating an atmosphere for funding new ITS projects. Simultaneously, it will be valuable to academic groups, motivating students for new ideas of ITS and promoting new academic research work in the area.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We report on an elementary course in ordinary differential equations (odes) for students in engineering sciences. The course is also intended to become a self-study package for odes and is is based on several interactive computer lessons using REDUCE and MATHEMATICA . The aim of the course is not to do Computer Algebra (CA) by example or to use it for doing classroom examples. The aim ist to teach and to learn mathematics by using CA-systems.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

These are the Introduction slides for Comp6051 Social Networking Technologies. They outline the structure of the course, and give a (very brief) overview of the topics covered.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Presentation guide for Tom and Paul - apologies for quality/lack-of-rehersal. It was only intended as a mic-check, but I got carried away.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This is the introductory slides for Comp1209 Systems Design. In the first half we explain the structure of the course, and in the second we give a brief introduction to Systems (using Bloodhound SSC as a class exercise)

Relevância:

40.00% 40.00%

Publicador: