|
|
|
David G. Schwartz,Abdelouahab Bellou,Luis Garcia-Castrillo,Antonella Muraro,Nikolaos Papadopoulos
We explore the challenges of participation by members of emergency response communities who share a similar condition and treatment, and are called upon to participate in emergency events experienced by fellow members. Smartphones and location-based soci...
ver más
|
|
|
|
|
|
|
Eerika Finell and Annukka Vainio
It has been well documented that both risk perception and group identification are related to psychosocial well-being. However, their combined effect has rarely been analyzed. We examined the combined effect of perceived risk associated with COVID-19 inf...
ver más
|
|
|
|
|
|
|
Pierre Benz,Edwin Blake
Pág. pp. 1 - 16 pgs.
This article explores how designing for impression management affects the design of cloudlet and other mobile colocated sharing services. We demonstrate how colocated concepts and experimentation led to the conceptualization and design of a sharing inter...
ver más
|
|
|
|
|
|
|
Francesca Rossi
The negative impacts of climate change on natural and anthropic ecosystems have led to the increasingly urgent search for policies, strategies and tools able to counteract degradation and risk factors on vulnerable landscapes. Among these, the research a...
ver más
|
|
|
|
|
|
|
Belen Pedregal, Cesare Laconi and Leandro del Moral
Addressing environmental governance conflicts requires the adoption of a complexity approach to carry out an adaptive process of collective learning, exploration, and experimentation. In this article, we hypothesize that by integrating community-based pa...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|
|
|
|
Ming-Te Chen and Tsung-Hung Lin
In recent years, several hospitals have begun using health information systems to maintain electronic health records (EHRs) for each patient. Traditionally, when a patient visits a new hospital for the first time, the hospital?s help desk asks them to fi...
ver más
|
|
|
|
|
|
|
Reyes Abad Flores,Macarena Gross Ariza
Pág. 72 - 81
RESUMEN: La serie fotográfica Salinas. Paisajes de silencio presentada en el Seminario internacional Paisajes de la sal (UPM 2019) se inserta en un proyecto de investigación estética que busca retratar espacios pensados, diseñados para/desde el silencio ...
ver más
|
|
|
|
|
|
|
Patrizia Pagliara, Amilcare Barca, Tiziano Verri and Carmela Caroppo
Marine cyanobacteria are a source of bioactive natural compounds, with a wide range of biotechnological applications. However, information on sponge-associated cyanobacteria are relatively scarce to date. In this paper, we carried out the morphological a...
ver más
|
|
|
|
|
|
|
Zakariae Belghazi, Nabil Benamar, Adnane Addaim and Chaker Abdelaziz Kerrache
With the rapid growth of Internet of Things (IoT) devices around the world, thousands of mobile users share many data with each other daily. IoT communication has been developed in the past few years to ensure direct connection among mobile users. Howeve...
ver más
|
|
|
|
|
|
|
Noor Aimran Samsudin,Muhamad Solehin Fitry Rosley,Raja Nafida Raja Shahminan,Sapura Mohamad
Pág. 277 - 283
Royal towns in Malaysia are the finest examples of traditional Malay towns, which are strongly associated with the long history of Malay Sultanates in Malaysia. This study aims to identify the significant characteristics that perhaps homogenously shared ...
ver más
|
|
|
|
|
|
|
Khatija Bibi Khan, Owen Seda
Pág. 10 pages
Feminist critics have identified the social constructedness of masculinity and have explored how male characters often find themselves caught up in a ceaseless quest to propagate and live up to an acceptable image of manliness. These critics have also ex...
ver más
|
|
|
|
|
|
|
S. Batohi
AbstractThis article highlights two themes that emerged from an in-depth multiple-case study of management teams in South African corporations that deserve closer attention in future research. First, it is shown that team composition is not staticand cha...
ver más
|
|
|
|
|
|
|
Christopher I Higgins,Michael Koutroumpas,Andreas Matheus,Andrew Seales
Pág. 107 - 124
Shibboleth is an open source implementation of the OASIS standard Security Assertion Markup Language (SAML). Shibboleth Access Management Federations (AMFs) are used daily around the globe by millions of users ? mainly in the academic realm ? in order to...
ver más
|
|
|
|
|
|
|
Viviana Silvia Leonardi,Silvina Elías,M. del Rosario Fernández
Pág. 189 - 206
RESUMEN: El presente artículo aborda el estudio del humedal costero de Villa del Mar partiendo de comprender al territorio como un sistema complejo y dinámico caracterizado por la multiplicidad de variables que interaccionan en el mismo buscando los ele...
ver más
|
|
|
|
|
|
|
Viviana Silvia Leonardi,Silvina Elías,M. del Rosario Fernández
Pág. 189 - 206
RESUMEN: El presente artículo aborda el estudio del humedal costero de Villa del Mar partiendo de comprender al territorio como un sistema complejo y dinámico caracterizado por la multiplicidad de variables que interaccionan en el mismo buscando lo...
ver más
|
|
|
|