Gotowa bibliografia na temat „Timed business protocols”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Timed business protocols”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Timed business protocols"

1

MOKHTARI-ASLAOUI, KARIMA, SALIMA BENBERNOU, SOROR SAHRI, VASILIOS ANDRIKOPOULOS, FRANK LEYMANN, and MOHAND-SAID HACID. "TIMED PRIVACY-AWARE BUSINESS PROTOCOLS." International Journal of Cooperative Information Systems 21, no. 02 (June 2012): 85–109. http://dx.doi.org/10.1142/s0218843012500013.

Pełny tekst źródła
Streszczenie:
Web services privacy issues have been attracting more and more attention in the past years. Since the number of Web services-based business applications is increasing, the demands for privacy enhancing technologies for Web services will also be increasing in the future. In this paper, we investigate an extension of business protocols, i.e. the specification of which message exchange sequences are supported by the web service, in order to accommodate privacy aspects and time-related properties. For this purpose we introduce the notion of Timed Privacy-aware Business Protocols (TPBPs). We also d
Style APA, Harvard, Vancouver, ISO itp.
2

Elabd, Emad, Emmanuel Coquery, and Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols." International Journal of Web Services Research 9, no. 4 (October 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.

Pełny tekst źródła
Streszczenie:
Modeling Web services is a major step towards their automated analysis. One of the important parameters in this modeling, for the majority of Web services, is the time. A Web service can be presented by its behavior which can be described by a business protocol representing the possible sequences of message exchanges. To the best of the authors’ knowledge, automated analysis of timed Web services (e.g., compatibility and replaceability checking) is very difficult and in some cases it is not possible with the presence of implicit transitions (internal transitions) based on time constraints. The
Style APA, Harvard, Vancouver, ISO itp.
3

AlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Biornstad, Biorn, Cesare Pautasso, and Gustavo Alonso. "Enforcing web services business protocols at run-time: a process-driven approach." International Journal of Web Engineering and Technology 2, no. 4 (2006): 396. http://dx.doi.org/10.1504/ijwet.2006.010422.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Rao, N. H. "Electronic Commerce and Opportunities for Agribusiness in India." Outlook on Agriculture 32, no. 1 (March 2003): 29–33. http://dx.doi.org/10.5367/000000003101294235.

Pełny tekst źródła
Streszczenie:
Electronic commerce (or e-commerce) using Internet technologies helps businesses to cut costs and cycle times, raise efficiency and provide more information, choice and value to consumers. Agribusinesses in India will need to deploy Internet technologies to gain competitive advantage and avoid isolation from mainstream businesses. Some challenges to becoming e-commerce-enabled are technical (limited infrastructure for Internet access), some are government policy-related (bandwidth, free movement of goods across states, market and trade policies), and some are legal. Many of these challenges ar
Style APA, Harvard, Vancouver, ISO itp.
6

UBERMORGEN, /. "Everything is always (the liquid protocol)." Finance and Society 2, no. 2 (December 19, 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.

Pełny tekst źródła
Streszczenie:
UBERMORGEN are lizvlx (AT, 1973) and Hans Bernhard (CH/USA, 1971), European artists and net.art pioneers. They tenaciously convert code & language and concept & aesthetics into digital objects, software art, net.art, installation, new painting, videos, press releases and actions. CNN described them as ‘maverick Austrian business people’ and the New York Times called Google Will Eat Itself ‘simply brilliant’. Their main influences are Rammstein, Samantha Fox, Guns N’ Roses & Duran Duran, Olanzapine, LSD & Kentucky Fried Chicken’s Coconut Shrimps Deluxe. Visit their website at ht
Style APA, Harvard, Vancouver, ISO itp.
7

Sayeed, Sarwar, and Hector Marco-Gisbert. "Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks." Applied Sciences 10, no. 18 (September 22, 2020): 6607. http://dx.doi.org/10.3390/app10186607.

Pełny tekst źródła
Streszczenie:
The blockchain is a distributed ledger technology that is growing in importance since inception. Besides cryptocurrencies, it has also crossed its boundary inspiring various organizations, enterprises, or business establishments to adopt this technology benefiting from the most innovative security features. The decentralized and immutable aspects have been the key points that endorse blockchain as one of the most secure technologies at the present time. However, in recent times such features seemed to be faded due to new attacking techniques. One of the biggest challenges remains within the co
Style APA, Harvard, Vancouver, ISO itp.
8

Herschel, Richard T., and Nicolle Clements. "The Importance of Storytelling in Business Intelligence." International Journal of Business Intelligence Research 8, no. 1 (January 2017): 26–39. http://dx.doi.org/10.4018/ijbir.2017010102.

Pełny tekst źródła
Streszczenie:
This paper examines the relevance and importance of storytelling to business intelligence. Business intelligence provides analytics to inform a decision-making process. However, there are often times issues with understanding the analytics presented and contextualizing the analytics to the overall decision-making process. This paper examines these issues and then assesses the value of storytelling in conveying BI findings. The SOAP protocol used for physician/patient clinical encounters is presented to illustrate the benefit of providing structure to a decision-making process. The importance o
Style APA, Harvard, Vancouver, ISO itp.
9

Rigin, Anton Mikhailovich, and Sergey Andreevich Shershakov. "Method of Performance Analysis of Time-Critical Applications Using DB-Nets." Proceedings of the Institute for System Programming of the RAS 33, no. 3 (2021): 109–22. http://dx.doi.org/10.15514/ispras-2021-33(3)-9.

Pełny tekst źródła
Streszczenie:
These days, most of time-critical business processes are performed using computer technologies. As an example, one can consider financial processes including trading on stock exchanges powered by electronic communication protocols such as the Financial Information eXchange (FIX) Protocol. One of the main challenges emerging with such processes concerns maintaining the best possible performance since any unspecified delay may cause a large financial loss or other damage. Therefore, performance analysis of time-critical systems and applications is required. In the current work, we develop a nove
Style APA, Harvard, Vancouver, ISO itp.
10

Jain, Tarun, and Bijendra Nath Jain. "Infection Testing at Scale: An Examination of Pooled Testing Diagnostics." Vikalpa: The Journal for Decision Makers 46, no. 1 (March 2021): 13–26. http://dx.doi.org/10.1177/02560909211018906.

Pełny tekst źródła
Streszczenie:
Executive Summary In pandemics or epidemics, public health authorities need to rapidly test a large number of individuals without adequate testing kits. We propose a testing protocol to accelerate infection diagnostics by combining multiple samples, and in case of positive results, re-test individual samples. The key insight is that a negative result in the first stage implies negative infection for all individuals. Thus, a single test could rule out infection in multiple individuals. Using simulations, we show that this protocol reduces the required number of testing kits, especially when the
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Timed business protocols"

1

Ponge, Julien Nicolas Computer Science &amp Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.

Pełny tekst źródła
Streszczenie:
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted that a service description should include not only the interface, but also the business protocol supported by the service. The present work focuses on the formalization of the important category of protocols that include time-related constraints (called timed protocols), and the impact of time on compatibility and replaceability analysis. We formalized the following timing constraints: CInvoke constraints define time wi
Style APA, Harvard, Vancouver, ISO itp.
2

Elabd, Emad. "Compliance of Web services over a high level specification." Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.

Pełny tekst źródła
Streszczenie:
Actuellement, la technologie des services Web évolue rapidement, en étant soutenue par les grands acteurs du domaine des systèmes d'information. Les applications basés sur services Web sont faiblement couplées et utilisables de façon automatique via l'utilisation d'un ensemble de normes basées sur XML. Hormis la description syntaxique des messages, il est nécessaire d’avoir une description sémantique du comportement des services. En effet, lors de la conception d'un service ou lors d'une composition de services, il est important de vérifier la conformité avec un cahier des charges. L’enrichiss
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Timed business protocols"

1

Ovodenko, Alexander. Producers, Trade Groups, and the Design of Global Environmental Regimes. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190677725.003.0006.

Pełny tekst źródła
Streszczenie:
The chapter provides a macro-level analysis of the legalization, standardization, and integration of global environmental rules. The statistical tests rely on two new datasets on global treaty regimes and business stakeholders in those regimes. The results demonstrate that treaty regimes that regulate oligopolistic industries tend to become integrated over time with protocols, amendments, and similar agreements that add new rules or institutions to the international regime. They also consist of legally binding agreements, not soft law commitments by parties, and standardized rules applicable t
Style APA, Harvard, Vancouver, ISO itp.
2

Calloway, Colin G. Treaties and Treaty Making. Edited by Frederick E. Hoxie. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199858897.013.34.

Pełny tekst źródła
Streszczenie:
This chapter surveys how treaty making involving American Indians developed and changed over time. Early colonial treaties involved a hybrid diplomacy of Native rituals and European protocols, and business was conducted with wampum and oratory as much as with pen and paper. Increasingly, treaties involved land cessions. The United States adopted many of the forms of colonial treaties but employed them primarily as instruments of dispossession and removal. In the nineteenth century, the expanding nation-state made treaties that confined Indian peoples to reservations and that also included meas
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Timed business protocols"

1

Copei, Sebastian, Manuel Wickert, and Albert Zündorf. "Certification as a Service." In Agile Processes in Software Engineering and Extreme Programming – Workshops, 203–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58858-8_21.

Pełny tekst źródła
Streszczenie:
Abstract The development of industry 4.0 and smart energy IT-Components relies on highly standardized communication protocols to reach vendor-independent interoperability. In innovative and fast-changing environments, the support of standard protocols increases the time to market significantly. In the energy domain, the business models and the regulatory frameworks will be updated more often than the protocols. Thus agile development and supporting standardized protocols at the same time seems to be an issue. Here we will present a new proposal for standardization and certification processes as well as an architecture for a certification platform. Both will improve the support of agile development in the industry and energy domain.
Style APA, Harvard, Vancouver, ISO itp.
2

Engel, Markus, Christopher Kramer, Tobias Braun, Dennis Christmann, and Reinhard Gotzhein. "BiPS – A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its Application." In E-Business and Telecommunications, 313–36. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11039-0_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Norville, Richard S., Kamesh Namuduri, and Ravi Pendse. "Node Authentication in Networks Using Zero-Knowledge Proofs." In Web Services Security and E-Business, 142–64. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch008.

Pełny tekst źródła
Streszczenie:
Zero-knowledge proof (ZKP) based authentication protocols provide a smart way to prove an identity of a node without giving away any information about the secret of that identity. There are many advantages as well as disadvantages to using this protocol over other authentication schemes, and challenges to overcome in order to make it practical for general use. This chapter examines the viability of ZKPs for use in authentication protocols in networks. It is concluded that nodes in a network can achieve a desired level of security by trading off key size, interactivity, and other parameters of the authentication protocol. This chapter also provides data analysis that can be useful in determining expected authentication times based on device capabilities. Pseudocode is provided for implementing a graph-based ZKP on small or limited processing devices.
Style APA, Harvard, Vancouver, ISO itp.
4

Rabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Ontologies and Big Data Considerations for Effective Intelligence, 327–412. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch008.

Pełny tekst źródła
Streszczenie:
TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-Middle and Cryptanalysts can generate statistical information, tap, sniff, hack, inject and abuse XML data messages. The purpose of this study is to introduce architecture of new approach of exchanging XML data files between different Services in order to minimize the risk of any alteration, data loss, data abuse, data misuse of XML critical business data information during transmission; by implementing a vertical partitioning on XML files. Another aim is to create a virtual environment within internet cloud prior to data transmission in order to utilise the communication method and rise up the transmission performance along with resources utilisation and spreads the partitioned XML file (shredded) through several paths within multi agents that form a multipath virtual network. Virtualisation in cloud network infrastructure to take advantage of its scalability, operational efficiency, and control of data flow are considered in this architecture. A customized UDP Protocol in addition to a pack of modules in RIDX adds a reliable (Lossless) and Multicast data transmission to all nodes in a virtual cloud network. A comparative study has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX) using RIDX UDP protocol against standard TCP protocol. Starting from 4 nodes up to 10 nodes in the domain, the results showed an enhanced performance using RIDX architecture over the standard TCP protocol.
Style APA, Harvard, Vancouver, ISO itp.
5

Rabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 270–357. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch013.

Pełny tekst źródła
Streszczenie:
TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-Middle and Cryptanalysts can generate statistical information, tap, sniff, hack, inject and abuse XML data messages. The purpose of this study is to introduce architecture of new approach of exchanging XML data files between different Services in order to minimize the risk of any alteration, data loss, data abuse, data misuse of XML critical business data information during transmission; by implementing a vertical partitioning on XML files. Another aim is to create a virtual environment within internet cloud prior to data transmission in order to utilise the communication method and rise up the transmission performance along with resources utilisation and spreads the partitioned XML file (shredded) through several paths within multi agents that form a multipath virtual network. Virtualisation in cloud network infrastructure to take advantage of its scalability, operational efficiency, and control of data flow are considered in this architecture. A customized UDP Protocol in addition to a pack of modules in RIDX adds a reliable (Lossless) and Multicast data transmission to all nodes in a virtual cloud network. A comparative study has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX) using RIDX UDP protocol against standard TCP protocol. Starting from 4 nodes up to 10 nodes in the domain, the results showed an enhanced performance using RIDX architecture over the standard TCP protocol.
Style APA, Harvard, Vancouver, ISO itp.
6

Vukovic, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Handbook of Research on E-Business Standards and Protocols, 412–29. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch019.

Pełny tekst źródła
Streszczenie:
Web 2.0 is shifting work to online, virtual environments. At the same time social networking technologies are accelerating the discovery of experts, increasing the effectiveness of online knowledge acquisition and collaborative efforts. Nowadays it is possible to harness potentially unknown (large) groups of networked specialists for their abilities to amass large-scale collections of data and to solve complex business and technical problems, in the process known as crowdsourcing. Large global enterprises and entrepreneurs are increasingly adopting crowdsourcing because of its promise to give simple, low cost, access to a scalable workforce online. Enterprise crowdsourcing examples abound, taking many different shapes and forms, from mass data collection to enabling end-user driven customer support. This chapter identifies requirements for common protocols and reusable service components, extracting from existing crowdsourcing applications, in order to enable standardized interfaces supporting crowdsourcing capabilities.
Style APA, Harvard, Vancouver, ISO itp.
7

Poon, Simpson. "Future of Small Business E-Commerce." In Encyclopedia of Information Science and Technology, First Edition, 1253–56. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch221.

Pełny tekst źródła
Streszczenie:
The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.
Style APA, Harvard, Vancouver, ISO itp.
8

Lee, Byung Kwan, Seung Hae Yang, and Tai-Chi Lee. "A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm." In Business Data Communications and Networking, 328–45. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-274-9.ch013.

Pełny tekst źródła
Streszczenie:
Unlike SET (secure electronic transaction) protocol. This chapter proposes a SEEP (highly secure electronic payment) protocol, which uses ECC (elliptic curve cryptosystem with F2 mnot Fp) (Koblitz, 1987; Miller, 1986; Harper, Menezes, & Vanstone, 1993), SHA (secure hash algorithm) and 3BC (block byte bit cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC and HECC (Hyper Elliptic Curve Cryptosystem) are used in 3BC (Cho, Shin, Lee, & Lee, 2002; Cho & Lee, 2002) algorithm, which generates session keys for the data encryption. In particular, when ECC and HECC are combined with 3BC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the 3BC algorithm in this chapter, the processing time is substantially reduced. In addition, the use of multiple signatures has some advantages of reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.
Style APA, Harvard, Vancouver, ISO itp.
9

Vuković, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Crowdsourcing, 173–92. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8362-2.ch009.

Pełny tekst źródła
Streszczenie:
Web 2.0 is shifting work to online, virtual environments. At the same time social networking technologies are accelerating the discovery of experts, increasing the effectiveness of online knowledge acquisition and collaborative efforts. Nowadays it is possible to harness potentially unknown (large) groups of networked specialists for their abilities to amass large-scale collections of data and to solve complex business and technical problems, in the process known as crowdsourcing. Large global enterprises and entrepreneurs are increasingly adopting crowdsourcing because of its promise to give simple, low cost, access to a scalable workforce online. Enterprise crowdsourcing examples abound, taking many different shapes and forms, from mass data collection to enabling end-user driven customer support. This chapter identifies requirements for common protocols and reusable service components, extracting from existing crowdsourcing applications, in order to enable standardized interfaces supporting crowdsourcing capabilities.
Style APA, Harvard, Vancouver, ISO itp.
10

Lin, Koong, Chad Lin, and Huei Leu. "Decision Analysis for Business to Adopt RFID." In Ubiquitous and Pervasive Computing, 1219–27. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch076.

Pełny tekst źródła
Streszczenie:
The need for more and more flexibility (in terms of time and location) in business operations, context-based services, decentralization of business processes, and information processing and innovative services has introduced new ubiquitous environments, sensing technologies, and pervasive devices. This new category of devices, sensors, and ubiquitous environments, has the capabilities to observe the users all the time using sensors; provide timely information to service providers using communication channels; and offer accurate services to users anywhere and anytime through tiny mobile terminals. This chapter provides the users of the pervasive business technologies an overview of the basic infrastructure and protocols used to form these ubiquitous wireless environments and provide context-based comfort, while taking care of confidentiality, secrecy, integrity, and authenticity. Along with an introduction to the markup languages, protocols, and security threats, the chapter concludes with the discussion of a range of common biometric, cryptographic, and routing solutions. The spending for RFID (radio frequency identification) has been increasing rapidly in recent years. According to Gartner, global spending on RFID is likely to reach US$3 billion by 2010 (CNET, 2005). In addition, interests continue to grow for the adoption of this mobile computing and commerce device in many different types of applications (ABI, 2006). In 2005, Wal-Mart asked its top 100 suppliers to use RFID tags, and this had a profound effect on the projected growth of RFID technology as well as potential applications in the industrial, defense, and retails sectors (Albertsons, 2004). However, very few studies have examined and evaluated the adoption of RFID options by the organizations. Organizations face various risks and uncertainties when assessing the adopted mobile technologies. Different organizations are likely to encounter different challenges and problems. This research aims to develop a mechanism that can help organizations to specify their risks and choose a suitable adoption alternative. This research has adopted the AHP (analytic hierarchy process) methodology to analyze the data, as it is useful for analyzing different RFID adoption alternatives and can assist organizations in predicting the possible issues and challenges when adopting RFID. The objectives of this article are to: (1) describe basic components of a mobile computing and commerce device, RFID; and (2) explore the current practices, issues, and applications in this mobile technology.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Timed business protocols"

1

Mokhtari, Karima, Salima Benbernou, Mohsen Rouached, Frank Leyman, and Mohand-Said Hacid. "Privacy Time-Related Analysis in Business Protocols." In 2009 IEEE International Conference on Web Services (ICWS). IEEE, 2009. http://dx.doi.org/10.1109/icws.2009.87.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Xiang, Mantian, Lihua Sun, and Lihong Li. "Time-diffusion synchronization protocols in wireless sensor networks." In 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011. http://dx.doi.org/10.1109/icebeg.2011.5882272.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

"TOWARDS RUN-TIME PROTOCOL ANOMALY DETECTION AND VERIFICATION." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001395802990304.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Alexieva, Sonya. "COMMUNICATIONS IN TOURISM IN TIMES OF PANDEMIC: FROM CONVENTIONAL TO DIGITAL CONNECTIVITY." In TOURISM AND CONNECTIVITY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/tc2020.655.

Pełny tekst źródła
Streszczenie:
Being one of the industries that have been the hardest hit by the coronavirus pandemic, tourism is actively using all communication channels, from conventional to digital connectivity in choosing messages. Trustworthy information is in the focus of finding an outcome from deadlock and stress in the context of gradual recovery of tourism services through adequate health and safety protocols. The synergy of conventional and digital communication in the COVID-19 era (digital technology and data, mobile applications, artificial intelligence etc.) effectively adapts the measures to a situation char
Style APA, Harvard, Vancouver, ISO itp.
5

Mekid, Samir, and Usman Akbar. "Configuration and Business Protocol of International Load Sharing of Manufacturing and its Challenges Under I4.0 and IIoT." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10158.

Pełny tekst źródła
Streszczenie:
Abstract The paper discusses the opportunities and challenges in a decentralized global manufacturing network infrastructure for international load sharing (ILS) envisaged for customized manufacturing. This is proposed to leverage Industry 4.0 factories to improve manufacturing throughput for worldwide orders. Smart manufactures are identified within IIoT worldwide subject to key specifications and performance. A business protocol is proposed to connect all manufacturing centers worldwide assuming their fitness to paradigm of industry 4.0 and utilizing technologies e.g. cloud computing, big-da
Style APA, Harvard, Vancouver, ISO itp.
6

Ma, Haiying, and Ning Cai. "Swarm Stability of Compartmental Networks with Linear Time-Invariant High-Order Dynamical Protocol." In 2011 International Conference on Business Computing and Global Informatization (BCGIn). IEEE, 2011. http://dx.doi.org/10.1109/bcgin.2011.138.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Resner, Davi, and Antonio Augusto Frohlich. "TSTP MAC: A Foundation for the Trustful Space-Time Protocol." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.159.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Lo Iacono Ferreira, Vanesa G., and Juan Ignacio Torregrosa López. "Life Cycle Sustainability Analysis for Circular Economy." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10490.

Pełny tekst źródła
Streszczenie:
A Life Cycle Sustainability Analysis is a complex assessment that requires time, expertise and quality data. Decision-making boards of industries required live data to manage their business. Although planned changes can be made pursuing innovation and sustainability within a wide timeframe, daily decisions are often driven just by economic indicators. However, many industries are already implementing systems, simple or complex, that allows them to obtain some environmental or social information related to their activities aware that not only economic value foster ther circular economy that our
Style APA, Harvard, Vancouver, ISO itp.
9

Porumb, Andra-Teodora, Adina Săcara-Oniţa, and Cristian Porumb. "THE DENTAL MEDICINE SECTOR IN THE AGE OF THE COVID-19 PANDEMIC – RECOVERY BETWEEN RISKS AND CHALLENGES." In Sixth International Scientific-Business Conference LIMEN Leadership, Innovation, Management and Economics: Integrated Politics of Research. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/limen.2020.101.

Pełny tekst źródła
Streszczenie:
In this paper we will show how the COVID-19 pandemic has affected one of the sectors that have undergone a booming development in recent years, namely the sector of dental medicine. This is an industry that includes numerous and diversified activities: treatments and surgical interventions in dental practices and clinics, dental aesthetics interventions in luxury clinics, the organization of specialization courses, conferences and congresses, the development of extremely innovative procedures and materials. Dental tourism has also had a spectacular trend, especially in Eastern European countri
Style APA, Harvard, Vancouver, ISO itp.
10

Rajan, Vaidyanath, Badri Narayanan, Michael Barrett, and Kevin Beardsley. "Stainless Steel Pipe Welding With No Backing Gas." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21799.

Pełny tekst źródła
Streszczenie:
Abstract For pipe fabrication shops, stainless steel pipe welding typically represents 15%–20% of their business. The pipe materials fabricated in these shops are primarily austenitic stainless 304L and 316L pipe. The quality requirements in stainless pipe fabrication shops are determined by performance requirements for service applications in low temperature, high temperature or corrosive environments. To enable the performance required in these applications, codes, standards and recommended practices for welding are frequently written from a conventional GTAW or SMAW welding paradigm. In add
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!