標(biāo)題: Titlebook: Sensor Systems and Software; First International Stephen Hailes,Sabrina Sicari,George Roussos Conference proceedings 2010 ICST Institute f [打印本頁(yè)] 作者: Goiter 時(shí)間: 2025-3-21 20:10
書(shū)目名稱Sensor Systems and Software影響因子(影響力)
書(shū)目名稱Sensor Systems and Software影響因子(影響力)學(xué)科排名
書(shū)目名稱Sensor Systems and Software網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Sensor Systems and Software網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Sensor Systems and Software被引頻次
書(shū)目名稱Sensor Systems and Software被引頻次學(xué)科排名
書(shū)目名稱Sensor Systems and Software年度引用
書(shū)目名稱Sensor Systems and Software年度引用學(xué)科排名
書(shū)目名稱Sensor Systems and Software讀者反饋
書(shū)目名稱Sensor Systems and Software讀者反饋學(xué)科排名
作者: 笨拙的你 時(shí)間: 2025-3-21 20:19
Gavin E. Churcher,Jeff Foleyew, or a general election manifesto, politicians seek to win support for their party’s legislative and policy programme in a variety of settings. There is a range of justificatory strategies available, and a politician may attempt to sell a policy by claiming, for instance, that it is justified on p作者: Constituent 時(shí)間: 2025-3-22 00:53 作者: 用肘 時(shí)間: 2025-3-22 05:54 作者: Macronutrients 時(shí)間: 2025-3-22 09:45
Marco Pugliese,Annarita Giani,Fortunato Santucciich people sustain their socioeconomic worlds, and in the more intentional adaptations and workarounds by which some communities seek to disconnect from capitalism, we can detect partial responses to the challenges of imagining a different economic future. As a cultural model of and for the world, c作者: 錫箔紙 時(shí)間: 2025-3-22 15:10 作者: 顛簸下上 時(shí)間: 2025-3-22 20:23
Hani Alzaid,DongGook Park,Juan González Nieto,Colin Boyd,Ernest Foohree basic pillars: “l(fā)iving-together”, “working-together”, and “hoping-together”. Living-togetherness involves the unconditional concern for basic human rights and the existential anxiety about the meaning of the organizational life. Working-togetherness refers to the practice of values/virtues (suc作者: Commemorate 時(shí)間: 2025-3-23 01:13 作者: Inculcate 時(shí)間: 2025-3-23 02:17 作者: Abjure 時(shí)間: 2025-3-23 07:23
Andrea Caiti,Emanuele Crisostomi,Andrea Munafòe modern age have been justified in different political, economic and cultural contexts.. It starts from the premise that wars have always been with us. Each essay is placed in historical context with the intention to question whether the Just War Tradition remains a valid theoretical framework for 作者: Minatory 時(shí)間: 2025-3-23 10:32 作者: 眉毛 時(shí)間: 2025-3-23 15:22
Michael Zoumboulakis,George Roussosite its youth and fragility, the PRC entered the Korean War exactly one year later. How did the Communist leadership persuade the Chinese military and people that it was in the best interests of their young and developing nation-state to intervene in Korea? Against the background of a contested hist作者: 流行 時(shí)間: 2025-3-23 18:54
Mahesh Arumugam,Sandeep S. Kulkarniite its youth and fragility, the PRC entered the Korean War exactly one year later. How did the Communist leadership persuade the Chinese military and people that it was in the best interests of their young and developing nation-state to intervene in Korea? Against the background of a contested hist作者: Radiculopathy 時(shí)間: 2025-3-24 01:46 作者: 歡樂(lè)東方 時(shí)間: 2025-3-24 02:52 作者: Colonoscopy 時(shí)間: 2025-3-24 09:47 作者: Interregnum 時(shí)間: 2025-3-24 13:13
óscar Gama,Paulo Carvalho,J. A. Afonso,P. M. Mendesritory of models and interpretations and is vast and full of ambushes. In many places, the previous chapters indicated that, in addition to relying on multi-level and disparate evidence, the justification of the dependable behaviour of a computer system critically depend on truthful models of the re作者: cacophony 時(shí)間: 2025-3-24 18:15
Sarfraz Nawaz,Muzammil Hussain,Simon Watson,Niki Trigoni,Peter N. Greenritory of models and interpretations and is vast and full of ambushes. In many places, the previous chapters indicated that, in addition to relying on multi-level and disparate evidence, the justification of the dependable behaviour of a computer system critically depend on truthful models of the re作者: 致命 時(shí)間: 2025-3-24 22:54
Helena Fernández-López,Pedro Macedo,José A. Afonso,J. H. Correia,Ricardo Sim?esritory of models and interpretations and is vast and full of ambushes. In many places, the previous chapters indicated that, in addition to relying on multi-level and disparate evidence, the justification of the dependable behaviour of a computer system critically depend on truthful models of the re作者: 招惹 時(shí)間: 2025-3-25 00:50
A. G. Ruzzelli,A. Schoofs,G. M. P. O’Hare,M. Aoun,P. van der Stok late, reveals its absence. And yet, a system cannot be relied upon unless its safety can be explained, demonstrated and certified. The practical and difficult questions which motivate this study concern the evidence and the arguments needed to justify the safety of a computer based system, or more 作者: overreach 時(shí)間: 2025-3-25 04:15
he history of the policy area or programme, the need for consistency between their chosen argument and the party’s core values, the prevailing political climate, and the audience they will address. By the same token, scholars must take these same factors into consideration if they are to supply a fu作者: Filibuster 時(shí)間: 2025-3-25 08:50
Gavin E. Churcher,Jeff Foleyhe history of the policy area or programme, the need for consistency between their chosen argument and the party’s core values, the prevailing political climate, and the audience they will address. By the same token, scholars must take these same factors into consideration if they are to supply a fu作者: 我要沮喪 時(shí)間: 2025-3-25 13:46 作者: 召集 時(shí)間: 2025-3-25 16:39
Victor Custodio,Jose Ignacio Moreno,Juan Pablo Vi?uelahe history of the policy area or programme, the need for consistency between their chosen argument and the party’s core values, the prevailing political climate, and the audience they will address. By the same token, scholars must take these same factors into consideration if they are to supply a fu作者: Presbyopia 時(shí)間: 2025-3-25 20:11 作者: 破譯密碼 時(shí)間: 2025-3-26 03:34 作者: concert 時(shí)間: 2025-3-26 05:00 作者: 小口啜飲 時(shí)間: 2025-3-26 08:50
Alexandre Guitton,Nassima Hadidreferred court in its almost twenty years of activity.. This will allow us to render specific the argument, by coming in touch with the peculiar problems which arise in the three dimensions of legitimacy of a tax system (i.e. political participation, substantive correctness and guaranteed implementa作者: 寬容 時(shí)間: 2025-3-26 13:12
Wen-Tzeng Huang,Jing-Ting Lin,Chin-Hsing Chen,Yuan-Jen Chang,You-Yin Chento be found in the fact that tax norms have been produced in a democratic way (in fashionable terms, by ., or to put it in slightly different words, that positive tax law is democratic and . makes it legitimate. This requires explaining in what sense and for which reasons only democracy fills the ju作者: Console 時(shí)間: 2025-3-26 20:16 作者: febrile 時(shí)間: 2025-3-27 00:05 作者: 一再困擾 時(shí)間: 2025-3-27 01:22 作者: 惡名聲 時(shí)間: 2025-3-27 07:43 作者: CAGE 時(shí)間: 2025-3-27 10:59
Chong Shen,Sean Harte,Emanuel Popovici,Brendan O’Flynn,John Barton proprietor Lord Beaverbrook, and was even cited as a contributing factor in the establishment of the Royal Commission on the Press in 1947. Its demonstrable wrong-headedness has prompted many historians of the British press and appeasement to largely dismiss the . from their analyses, or even to ig作者: 得體 時(shí)間: 2025-3-27 17:11 作者: 執(zhí)拗 時(shí)間: 2025-3-27 18:47
M. Amoretti,F. Wientapper,F. Furfari,S. Lenzi,S. Chessa, analysis and valuation, are essential in the justification of the dependability of an engineered system. Surprisingly, they have been almost completely neglected by engineers and researchers working on computer system safety cases. And in those cases where models are evoked, they are often confuse作者: 不足的東西 時(shí)間: 2025-3-28 00:24 作者: Graphite 時(shí)間: 2025-3-28 04:44 作者: jealousy 時(shí)間: 2025-3-28 08:05
Helena Fernández-López,Pedro Macedo,José A. Afonso,J. H. Correia,Ricardo Sim?es, analysis and valuation, are essential in the justification of the dependability of an engineered system. Surprisingly, they have been almost completely neglected by engineers and researchers working on computer system safety cases. And in those cases where models are evoked, they are often confuse作者: LINE 時(shí)間: 2025-3-28 13:29 作者: Pseudoephedrine 時(shí)間: 2025-3-28 14:51 作者: 膽汁 時(shí)間: 2025-3-28 22:29 作者: Endemic 時(shí)間: 2025-3-29 00:11
Evaluation of the Impact of the Topology and Hidden Nodes in the Performance of a ZigBee Network,topology. Results indicate that, to achieve a delivery ratio (DR) higher than 99%, the number of electrocardiogram (ECG) nodes in a star network must not exceed 35. However, considering a tree topology, the maximum number of nodes must be reduced to 18 to maintain the same DR. The network performanc作者: 兇殘 時(shí)間: 2025-3-29 06:24 作者: 知識(shí)分子 時(shí)間: 2025-3-29 08:43
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/s/image/865142.jpg作者: fibroblast 時(shí)間: 2025-3-29 14:18
https://doi.org/10.1007/978-3-642-11528-8MANET; Peer; ZigBee; assisted living; distributed systems; health care; healthcare; mobile agents; multi-hop作者: 繁榮中國(guó) 時(shí)間: 2025-3-29 18:29 作者: 排他 時(shí)間: 2025-3-29 21:38 作者: hermetic 時(shí)間: 2025-3-30 03:05
Applying Complex Event Processing and Extending Sensor Web Enablement to a Health Care Sensor Netwoement Working Group which offers methods to virtualize sensor data into a common, self-describing format, using access mechanisms based on HTTP. Using these standards, applications are able to discover and access different sensor offerings, automatically understand the data format used and even spec作者: 門閂 時(shí)間: 2025-3-30 05:56 作者: temperate 時(shí)間: 2025-3-30 10:27
A Large-Scale Wireless Network Approach for Intelligent and Automated Meter Reading of Residential nd of energy. Current solutions are based on experience, historical demand behavior and global control of the electrical grid, but they lack of detailed information about users consumption behavior. In the future, electric companies will need to know, almost in real time, user needs on energy to avo作者: 天氣 時(shí)間: 2025-3-30 16:11
Weak Process Models for Attack Detection in a Clustered Sensor Network Using Mobile Agents,ls are a non-parametric version of Hidden Markov models (HMM), wherein state transition probabilities are reduced to rules of reachability. Specifically, we present an intrusion detection system based on anomaly detection logic. It identifies any observable event correlated to a threat by applying a作者: 盲信者 時(shí)間: 2025-3-30 19:53
Key Establishment Using Group Information for Wireless Sensor Networks,, security of these networks relies mostly on key establishment and routing protocols. We present a new approach to key establishment, which combines a group-based distribution model and identity-based cryptography. Using this solution enables sensor nodes to authenticate each other, and provides th作者: Agility 時(shí)間: 2025-3-30 21:24
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA,wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such作者: 成份 時(shí)間: 2025-3-31 03:19 作者: intelligible 時(shí)間: 2025-3-31 08:02 作者: 引起 時(shí)間: 2025-3-31 12:06 作者: 拍下盜公款 時(shí)間: 2025-3-31 17:24 作者: 連累 時(shí)間: 2025-3-31 18:20 作者: exophthalmos 時(shí)間: 2025-4-1 00:52 作者: 通知 時(shí)間: 2025-4-1 04:22
Energy-Aware Dynamic Route Management for THAWS,r consumption. The two tiered Tyndall Heterogeneous Automated Wireless Sensors (THAWS) tool is used to quickly create and configure application-specific sensor networks. To this end, we propose to implement a distributed route discovery algorithm and a practical energy-aware reaction model on the 25作者: 自然環(huán)境 時(shí)間: 2025-4-1 09:47
All Roads Lead to Rome: Data Highways for Dense Wireless Sensor Networks,ved through the creation of a set of data “highways” that carry packets across the network, from source(s) to sink(s). Current approaches to the design of these highways however require a–priori knowledge of the global network topology, with consequent communications burden and scalability issues, p作者: 任意 時(shí)間: 2025-4-1 12:05
Sensor Data Fusion for Activity Monitoring in Ambient Assisted Living Environments,es to infer new knowledge from collected and fused sensor data, dealing with highly dynamic environments where devices continuously change their availability and (or) physical location. We describe the Sensor Abstraction and Integration Layer (SAIL), we introduce the Human Posture Classification com作者: Ligament 時(shí)間: 2025-4-1 16:45
Trade-off Analysis of a MAC Protocol for Wireless e-Emergency Systems,ly data delivery, they have increased demands for quality of service, including at the MAC layer. Amongst MAC protocols available for WSNs, the Low Power Real Time (LPRT) presents suitable characteristics to be deployed in emergency platforms due to its rational bandwidth allocation, low energy cons