Search results for "Crypt"

showing 10 items of 1111 documents

Ready to Go? Schools’ Preparedness for Teaching and Learning Within a One-to-One Program

2020

Part 6: ICT and Education; International audience; During the years there has been an increasing number of one-to-one programs around the world. In such programs all students are equipped with portable devices, such as laptops, tablets, smartphones for learning purposes. Even if these initiatives are increasing, our knowledge of the impact of such digital transformation of education is still little studied. Based on data from a three years longitudinal study on a large-scale implementation of Chromebooks in a municipality, this paper highlights teachers’ experiences. Key findings suggest that this initiative has been successful when it comes to the administrative and technical implementatio…

Schoolbusiness.industry4. Education05 social sciencesDigital transformation050401 social sciences methods050301 educationTeachersPublic relations[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]One-to-One program0504 sociologyPreparednessPolitical scienceImplementationKey (cryptography)One-to-one[INFO]Computer Science [cs]businessInnovation0503 education
researchProduct

Distributed Scrum when Turning into Maintenance : A Single Case Study

2015

Global software development using agile methods is commonplace in software industry nowadays. Scrum, as the agile development management framework, can be distributed in many ways, especially concerning how the key roles are presented in different sites. We describe here a single case study of a distributed Scrum, mainly for maintenance of the already constructed web portal. Using a qualitative method, both working well and challenging parts of the software work, as experienced by the project stakeholders, are revealed and discussed.

ScrumEngineering managementKnowledge managementSoftwarebusiness.industryComputer scienceProject stakeholderEmpirical process (process control model)Key (cryptography)Software workSingle-subject designbusinessAgile software developmentComputer Science & Information Technology ( CS & IT )
researchProduct

L'administration conjointe du dossier patient: une responsabilité partagée entre le patient et le praticien

2011

National audience; The main problem faced by patients, health practitioners and the authorities, is namely the gathering and updating of administrative and medical data in order to accurately reconstitute a patient's medical history. Although solutions to accelerate and to ease this gathering are being implemented at the national level in several European countries, as unique health identifier in France, information still have to be validated before use. Through this article, we propose a mixed management of patients' data, split between the patient regarding administrative information and the Medical Practitioner (MP) regarding medical information. This method is based on two processes. Th…

Secure Hash Algorithm020205 medical informaticsComputer scienceProcess (engineering)Medical record02 engineering and technologymedicine.diseaseIdentifier03 medical and health sciences0302 clinical medicineAccountability0202 electrical engineering electronic engineering information engineeringCryptographic hash functionmedicineMedical history030212 general & internal medicineMedical emergencyInefficiency
researchProduct

Estimating the non-market benefits of water quality improvement for a case study in Spain: A contingent valuation approach

2012

Abstract This article addresses an important topic related to the application of the European Water Framework Directive (WFD) in Spanish watersheds. Results on a contingent valuation study, aimed to assess the non-market benefits of water quality improvements in the Guadiana river basin (GRB), are shown. Special attention has been paid to the issue of zero willingness-to-pay (WTP) responses, while addressing the possible presence of self-selection caused by protest responses. The results (i) indicate that sample selection bias is not a problem in our application, (ii) allow us to identify some key determinants of voting behaviour, and (iii) through the use of different econometric models al…

Selection biasgeographyContingent valuationgeography.geographical_feature_categorybusiness.industrymedia_common.quotation_subjectGeography Planning and DevelopmentEnvironmental resource managementDrainage basinManagement Monitoring Policy and LawEconometric modelWater Framework DirectiveVotingKey (cryptography)EconometricsEconomicsWater qualitybusinessmedia_commonEnvironmental Science & Policy
researchProduct

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct

On the Optimization of Self-Organizing Maps by Genetic Algorithms

1999

Publisher Summary This chapter reviews the research on the genetic optimization of self-organizing maps (SOMs). The optimization of learning rule parameters and of initial weights is able to improve network performance. The latter, however, requires chromosome sizes proportional to the size of the SOM and becomes unwieldy for large networks. The optimization of learning rule structures leads to self-organization processes of character similar to the standard learning rule. A particularly strong potential lies in the optimization of SOM topologies, which allows the study of global dynamical properties of SOMs and related models, as well as to develop tools for their analysis. Hierarchies of …

Self-organizing mapbusiness.industryComputer scienceProcess (engineering)Machine learningcomputer.software_genreNetwork topologyChromosome (genetic algorithm)Learning ruleCode (cryptography)Network performanceArtificial intelligenceData pre-processingbusinesscomputer
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

Vertical integration and exclusivities in maritime freight transport

2011

A key recent theme in maritime freight transport is the involvement of shipping lines in terminal management. Such investments are costly but allow liners to provide better service. Most of these new terminals are dedicated terminals but some are non-exclusive and let rivals access them for a fee. In this paper, we show that a shipping line that builds its own terminal finds it strategically profitable (i) to continue routing part of its cargo through the open port facilities, and (ii) to keep its terminal non-exclusive. In this way, the liner investor pushes part of the rival's freight from the open to the new terminal. Besides, under non-exclusivities, the shipping lines offer a wider var…

Service (business)Engineeringbusiness.industryOpen portjel:L91TransportationShipping lineVertical integrationVariety (cybernetics)Transport engineeringfreight transport shipping lines vertical integrationTerminal (electronics)jel:L13Key (cryptography)jel:R40Profitability indexBusiness and International ManagementbusinessTelecommunicationsCivil and Structural Engineering
researchProduct

A combined fuzzy-SEM evaluation approach to identify the key drivers of the academic library service quality in the digital technology era: An empiri…

2017

A conceptual model of the Academic Library (AL) service quality is hypothesized in the present article, and then validated and analyzed by a novel evaluation approach. Specifically, the conceptual model integrates the fundamental attributes of the canonical AL service together with those more relevant of the new and widely considered AL Electronic Service (e-services). As concerns the evaluation approach, it incorporates the Fuzzy Sets Theory (FST) so as to deal with the students' uncertainty over their own judgments on the AL service quality and a Structural Equation Model (SEM) to validate the conceptual model and to determine the key drivers of the AL service quality. The effectiveness o…

Service (business)Service qualityInformation Systems and ManagementKnowledge managementOperations researchComputer Networks and Communicationsbusiness.industryComputer science05 social sciencesConceptual model (computer science)02 engineering and technologyLibrary and Information SciencesFuzzy logicEmpirical research0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processing0509 other social sciences050904 information & library sciencesbusinessInformation SystemsJournal of the Association for Information Science and Technology
researchProduct