Zobrazeno 1 - 10
of 34
pro vyhledávání: '"William McIver"'
Publikováno v:
Bone Abstracts.
Publikováno v:
The Birds of North America Online.
Publikováno v:
IFIP Advances in Information and Communication Technology
ICT Critical Infrastructures and Society ISBN: 9783642333316
HCC
ICT Critical Infrastructures and Society ISBN: 9783642333316
HCC
Part 1: Human Choice and Computers International Conference (HCC10); International audience; For 40 years, the academics and business executives who have attended the Human Choice and Computers international conference series have discussed human cho
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2a50b3342d9dfc997acc3371625341ce
https://hal.inria.fr/hal-01525122
https://hal.inria.fr/hal-01525122
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully review
Publikováno v:
ANT/SEIT
Autor:
William McIver
This chapter attempts to draw parallels between Professor Gunilla Bradley’s Convergence Model and the body of work by a now seemingly obscure architect and urban planner, Constantinos A. Doxiadis. Doxiadis developed the theory of ’Ekistics’ as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::439467d6c0982b51924f0629eb70c848
https://doi.org/10.4018/978-1-60960-057-0.ch004
https://doi.org/10.4018/978-1-60960-057-0.ch004
Publikováno v:
2010 Sixth International conference on Wireless Communication and Sensor Networks.
Existing authentication techniques assumes a one-to-one relationship between the user and the device. However using multiple devices simultaneously by a single user in ubiquitous environments is inherently natural. In this paper we present use cases
Publikováno v:
CNSR
Video-based communications are becoming more important within domains, such as health care, that have stringent security and privacy requirements for data. VPN-based encryption is a now common part of organizational security architectures. It is expe