Search results for "Web"

showing 10 items of 2018 documents

A Study on the Usage of Smartphone Apps in Fire Scenarios - Comparison between GDACSmobile and SmartRescue Apps

2015

In this paper, we present a thorough overview of the two recently developed applications in the field of emergency management. The applications titled GDACSmobile and SmartRescue are using mobile app and smartphone sensors as the main functionality respectively. Furthermore, we argue the differences and similarities of both applications and highlight their strengths and weaknesses. Finally, a critical scenario for fire emergency in a music festival is designed and the applicability of the features of each application in supporting the emergency management procedure is discussed. It is also argued how the aforementioned applications can support each other during emergencies and what the pote…

World Wide WebEmergency managementComputer sciencebusiness.industrySmartphone appMusic festivalMobile appsbusinessStrengths and weaknessesField (computer science)Proceedings of the 17th International Conference on Enterprise Information Systems
researchProduct

Network Analysis of Platform Ecosystems: The Case of Internet of Things Ecosystem

2015

Software platform providers are often seen as the cornerstone of their business ecosystem, where the other ecosystem players utilize the platform’s standardized components together with complementary components for making applications. These platforms are also becoming a cornerstone of the emerging Internet of Things (IoT) business ecosystem comprised of the companies who provide Internet-enabled devices, applications, connectivity solutions, and the platforms for the IoT usage. While a number of enabling technologies for IoT is available, the question remains what kind of ecosystem emerges around IoT platform providers and whether this ecosystem is evolving in line with the theoretical mod…

World Wide WebEngineeringConsolidation (business)business.industryOrder (exchange)MainstreamCornerstoneEcosystemBusiness ecosystembusinessInternet of ThingsData scienceNetwork analysis
researchProduct

Honeypot utilization for analyzing cyber attacks

2016

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

World Wide WebEngineeringHoneypotSoftwarebusiness.industryPseudoserverEffective methodInformation securitybusinessComputer securitycomputer.software_genrecomputerHackerProccedings of the 10th European Conference on Software Architecture Workshops
researchProduct

Internet – Technical Development and Applications

2009

Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among resear…

World Wide WebEngineeringManagement information systemsbusiness.industryKey (cryptography)The InternetDigital economyInformation securitybusinessDomain (software engineering)
researchProduct

Comparing the Capabilities of Mobile Platforms for Business App Development

2015

Businesses increasingly embrace the possibilities of mobile computing. While there is broad advice for app developers in general, development of apps for enterprises is hardly covered. Business apps support internal processes and contribute to customer relationship management. The heterogeneity of platforms for mobile devices makes development difficult. At the same time, companies seek to support several platforms with their apps to maximize customer acceptance and to support the platforms best suited for their employees. Aiming at improving the knowledge on business app development, we present a framework for assessing mobile platforms. For this purpose, we have developed a distinct set o…

World Wide WebEngineeringMultimediabusiness.industryMobile computingAndroid (operating system)Customer relationship managementbusinesscomputer.software_genreMobile devicecomputer
researchProduct

IPS/UMS/WNGS/MUS 2008 Workshop - Message from the Workshop Organizers

2008

It is a great pleasure to welcome you to the 2008 IPS/UMS/WNGS/MUS workshop held in conjunction with the International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea. The workshop covers topics on ubiquitous multimedia services and security in ubiquitous multimedia systems. All the submitted papers have undergone rigorous review process by the technical program committee members and external reviewers. We have selected 17 best papers for presentation and publication in the conference proceedings.

World Wide WebEngineeringPresentationbusiness.industrymedia_common.quotation_subjectReview processbusinessmedia_commonPleasure2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)
researchProduct

How Cross-Platform Technology Can Facilitate Easier Creation of Business Apps

2017

Applications for mobile devices – apps – have seen unprecedented growth in importance. Ever better apps keep propelling the proliferation of mobile computing. App development is rather easy, particularly if it is based on Web technology. However, implementing apps that are user friendly and useful in the long-run is cumbersome. Thereby, it typically is expensive for corporate developers. Nonetheless, business apps are embraced by enterprises. To overcome the overhead of developing separately for multiple platforms and to mitigate the problems of device fragmentation, cross-platform development approaches are employed. While many such approaches exist, few have found widespread usage. In thi…

World Wide WebEngineeringbusiness.industryCross-platformbusiness
researchProduct

ACCESSIBILITY TO UNDERWATER CULTURAL HERITAGE: INTERACTIVE WEB NAVIGATION OF THE ROMAN SUBMERSED VESSEL OF CALA MINNOLA

2021

The possibilities offered by photogrammetric reconstruction based on computer vision algorithms allowed in recent years to develop new interesting solutions for the use and dissemination of knowledge on Cultural Heritage (CH). In the same way, the recent technological development in the field of Virtual Reality (VR) has offered new possibilities for the creation of interactive virtual environments which can be freely accessed via the browser using any type of device. These technologies acquire an additional relevance if applied to archaeological sites or monuments that are difficult to access, or even totally inaccessible, except by specialized personnel. In this case the virtual fruition o…

World Wide WebEngineeringbusiness.industryWeb navigationUnderwater cultural heritagebusinessProceedings ARQUEOLÓGICA 2.0 - 9th International Congress & 3rd GEORES - GEOmatics and pREServation
researchProduct

Hypertext'99 doctoral consortium report

1999

World Wide WebEngineeringbusiness.industrylawGeneral EngineeringGeneral Earth and Planetary SciencesHypertextbusinessGeneral Environmental Sciencelaw.invention
researchProduct

Behind the mask: Rethinking the use of face masks while exercising

2021

there is an ongoing global effort against COVID-19 pan-demic. As vaccination is applied globally (predominantly onat-risk populations), various measures such as temporaryself-quarantine, social distancing, increased hand hygiene,and wearing a face mask (FM) proposed by the World HealthOrganization (WHO) and various governments worldwide arestill in place as primary means of preventing further dissemi-nation. In many instances, wearing a FM became mandatorywhen a person is in a closed space while being accompa-nied by others. Many individuals are therefore apprehensivein terms of maintaining their usual physical activity rout-ines and staying safe in the midst of the outbreak. Asa result, it…

World Wide WebFace masks03 medical and health sciences2019-20 coronavirus outbreak0302 clinical medicineCoronavirus disease 2019 (COVID-19)face maskSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)Orthopedics and Sports Medicine030212 general & internal medicine030204 cardiovascular system & hematologyPsychologyLetter to the Editor
researchProduct