Search results for " networking"

showing 10 items of 1264 documents

State of the Art in Information Security Policy Development

2020

Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…

General Computer ScienceComputer scienceliterature reviewmedia_common.quotation_subjectContext (language use)Sample (statistics)02 engineering and technologyOutcome (game theory)information security policyconcept definitionState (polity)development method0202 electrical engineering electronic engineering information engineeringtietoturvaFunction (engineering)media_commonComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSpolicy developmenttietoturvapolitiikka020206 networking & telecommunicationsSubject (documents)kehittäminenInformation securityData scienceTerm (time)Information security policy020201 artificial intelligence & image processingLawkäsiteanalyysi
researchProduct

HyperLabelMe : A Web Platform for Benchmarking Remote-Sensing Image Classifiers

2017

HyperLabelMe is a web platform that allows the automatic benchmarking of remote-sensing image classifiers. To demonstrate this platform's attributes, we collected and harmonized a large data set of labeled multispectral and hyperspectral images with different numbers of classes, dimensionality, noise sources, and levels. The registered user can download training data pairs (spectra and land cover/use labels) and submit the predictions for unseen testing spectra. The system then evaluates the accuracy and robustness of the classifier, and it reports different scores as well as a ranked list of the best methods and users. The system is modular, scalable, and ever-growing in data sets and clas…

General Computer ScienceContextual image classificationComputer scienceMultispectral imageRegistered user020206 networking & telecommunications02 engineering and technologyBenchmarkingcomputer.software_genreData setStatistical classificationComputingMethodologies_PATTERNRECOGNITIONRobustness (computer science)ITC-ISI-JOURNAL-ARTICLE0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingData miningElectrical and Electronic EngineeringInstrumentationcomputerClassifier (UML)IEEE Geoscience and Remote Sensing Magazine
researchProduct

An efficient data model for energy prediction using wireless sensors

2019

International audience; Energy prediction is in high importance for smart homes and smart cities, since it helps reduce power consumption and provides better energy and cost savings. Many algorithms have been used for predicting energy consumption using data collected from Internet of Things (IoT) devices and wireless sensors. In this paper, we propose a system based on Multilayer Perceptron (MLP) to predict energy consumption of a building using collected information (e.g., light energy, day of the week, humidity, temperature, etc.) from a Wireless Sensor Network (WSN). We compare our system against four other classification algorithms, namely: Linear Regression (LR), Support Vector Machin…

General Computer ScienceMean squared errorComputer scienceReal-time computing02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]7. Clean energy[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineering020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationRandom forestSupport vector machineMean absolute percentage error13. Climate actionControl and Systems Engineering[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Multilayer perceptron020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Gradient boosting[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor network
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

Shall we follow? Impact of reputation concern on information security managers’ investment decisions

2020

Information security (infosec) is important for organizations. While budgeting for infosec is a crucial resource allocation decision, infosec managers may choose to follow other fellow experts’ recommendations or baseline practices. The present paper uses reputational herding theory to explain the decision made by infosec managers to use a “let's follow others” strategy in this context. Based on a sample of 106 organizations in Finland, we find that infosec managers’ ability to accurately predict the benefit of infosec investment, as well as their reputations, have significant effects on motivating them to discount their own information. Infosec managers’ discounting of their own informatio…

General Computer Sciencemedia_common.quotation_subjectpäätöksentekoorganisaatiotContext (language use)02 engineering and technologydecision makingdiscount own informationtietohallintojohtajat0202 electrical engineering electronic engineering information engineeringHerdingtietoturvauncertaintyBaseline (configuration management)media_commonDiscountingActuarial sciencetietoturvapolitiikka020206 networking & telecommunicationsInformation securityInvestment (macroeconomics)maineenhallintareputational herdingInfosec investmentInvestment decisions020201 artificial intelligence & image processingBusinessLawReputationComputers & Security
researchProduct

Analysis of the Past Lifetime in a Replacement Model through Stochastic Comparisons and Differential Entropy

2020

A suitable replacement model for random lifetimes is extended to the context of past lifetimes. At a fixed time u an item is planned to be replaced by another one having the same age but a different lifetime distribution. We investigate the past lifetime of this system, given that at a larger time t the system is found to be failed. Subsequently, we perform some stochastic comparisons between the random lifetimes of the single items and the doubly truncated random variable that describes the system lifetime. Moreover, we consider the relative ratio of improvement evaluated at x &isin

General MathematicsReliability (computer networking)Context (language use)02 engineering and technologystochastic ordersLifetime distribution01 natural sciencesMeasure (mathematics)differential entropyDifferential entropy010104 statistics & probabilitystochastic neuronal modelFixed time0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Applied mathematicsreliability; replacement model; stochastic orders; differential entropy; stochastic neuronal modelreplacement model0101 mathematicsEngineering (miscellaneous)Mathematicsreliabilitylcsh:Mathematicslcsh:QA1-939020201 artificial intelligence & image processingReplacement procedureRandom variableMathematics
researchProduct

Minimal forbidden patterns of multi-dimensional shifts

2005

We study whether the entropy (or growth rate) of minimal forbidden patterns of symbolic dynamical shifts of dimension 2 or more, is a conjugacy invariant. We prove that the entropy of minimal forbidden patterns is a conjugacy invariant for uniformly semi-strongly irreducible shifts. We prove a weaker invariant in the general case.

General Mathematics[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS][INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]020206 networking & telecommunications0102 computer and information sciences02 engineering and technology01 natural sciencesCombinatoricsConjugacy class010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringMulti dimensionalComputingMilieux_MISCELLANEOUSMathematics
researchProduct

Climate and structure of the 8.2 ka event reconstructed from three speleothems from Germany

2020

Abstract The most pronounced climate anomaly of the Holocene was the 8.2 ka cooling event. We present new 230Th/U-ages as well as high-resolution stable isotope and trace element data from three stalagmites from two different cave systems in Germany, which provide important information about the structure and climate variability of the 8.2 ka event in central Europe. In all three speleothems, the 8.2 ka event is clearly recorded as a pronounced negative excursion of the δ18O values and can be divided into a ‘whole event’ and a ‘central event’. All stalagmites show a similar structure of the event with a short negative excursion prior to the ‘central event’, which marks the beginning of the …

Global and Planetary Changegeographygeography.geographical_feature_category010504 meteorology & atmospheric sciencesδ18OAnomaly (natural sciences)Event (relativity)SpeleothemClimate changeFOS: Physical sciences020206 networking & telecommunicationsStalagmite02 engineering and technologyOceanography01 natural sciencesGeophysics (physics.geo-ph)Physics - GeophysicsCave13. Climate action0202 electrical engineering electronic engineering information engineeringPhysical geographyHoloceneGeology0105 earth and related environmental sciences
researchProduct

Gray code for permutations with a fixed number of cycles

2007

AbstractWe give the first Gray code for the set of n-length permutations with a given number of cycles. In this code, each permutation is transformed into its successor by a product with a cycle of length three, which is optimal. If we represent each permutation by its transposition array then the obtained list still remains a Gray code and this allows us to construct a constant amortized time (CAT) algorithm for generating these codes. Also, Gray code and generating algorithm for n-length permutations with fixed number of left-to-right minima are discussed.

Golomb–Dickman constantPolynomial codeRestricted permutationsGenerating algorithms0102 computer and information sciences02 engineering and technology01 natural sciencesTheoretical Computer ScienceGray codeCombinatoricsPermutation[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsTransposition arrayComputingMilieux_MISCELLANEOUSMathematicsDiscrete mathematicsSelf-synchronizing codeAmortized analysisMathematics::CombinatoricsParity of a permutation020206 networking & telecommunicationsGray codes010201 computation theory & mathematicsConstant-weight codeMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Demystifying the Possibilities of ICT4D in the Mountain Regions of Nepal

2011

Author's version of a chapter in the book: Proceedings of the 44th Hawaii International Conference on System Sciences. Also available from the publisher at: http://dx.doi.org/10.1109/HICSS.2011.142 Despite the substantial investments in ICT4D projects in developing countries, the benefits are yet to be realised by the majority of remote communities. Inaccessibility to ICT has widened educational, healthcare, information, and communication gaps between urban and remote communities. This paper focuses on an interpretive case study in Nepal to widen our understanding of how locally-initiated ICT4D projects may help to narrow these gaps. The study utilises the Assets Pentagon Model to identify …

GovernmentEconomic growthTelemedicinebusiness.industryDeveloping countryInformation technologyInformation and Communications TechnologyPolitical scienceHealth careInformation systemcommunication gaps mountain regions remote communities substantial investments wireless networkingVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Project managementbusinessEnvironmental planning2011 44th Hawaii International Conference on System Sciences
researchProduct