Filters








10,044 Hits in 3.5 sec

STORM - Collaborative Security Management Environment [chapter]

Theodoros Ntouskas, George Pentafronimos, Spyros Papastergiou
2011 Lecture Notes in Computer Science  
Identifying these weaknesses and exploiting advanced open-source technologies and interactive software tools, we propose a secure, collaborative environment (STORM) for the security management of ICS's  ...  Security Management is a necessary process in order to obtain an accurate security policy for Information and Communication Systems (ICS).  ...  The authors would like to thank the GSRT for funding the S-Port project, and the E.C. for funding the ImmigrationPolicy2.0 project.  ... 
doi:10.1007/978-3-642-21040-2_23 fatcat:qmgepfhmgvdtffao7com65kxjy

Digitalisation and COVID-19: The Perfect Storm

Denis Horgan, Joanne Hackett, C. Benedikt Westphalen, Dipak Kalra, Etienne Richer, Mario Romao, Antonio L. Andreu, Jonathan A. Lal, Chiara Bernini, Birute Tumiene, Stefania Boccia, Antoni Montserrat
2020 Biomedicine Hub  
Instead of sailing bravely into battle, it remains at the dockside, cowering from the storm beyond the breakwaters.  ...  already deeply engaged in a rescue mission for the whole of the human race.  ...  Acknowledgements We would like to thank the members of the European Alliance for Personalised Medicine, Million European Genome Alliance+ (MEGA+), and express thanks to the contribution from the consortium  ... 
doi:10.1159/000511232 pmid:33564668 pmcid:PMC7573902 fatcat:c7nyha3v45c77dteo4l3vdm6ya

Consolidated storm prediction for aviation (CoSPA)

Marilyn M. Wolfson, William J. Dupree, Roy M. Rasmussen, Matthias Steiner, Stanley G. Benjamin, Steven S. Weygandt
2008 2008 Integrated Communications, Navigation and Surveillance Conference  
Need to provide reliable forecast uncertainties for the storm predictions to be useful. 6.  ...  Permeability of storms an important factor to the user (drives the need for digital 4D depiction of the storm volume in the consolidated product). 8.  ...  , using heuristic and numerical models, for aviation applications.  ... 
doi:10.1109/icnsurv.2008.4559190 fatcat:d2g3sjcn5zhbpn5kb4onbvhpke

Urgent Computing of Storm Surge for North Carolina's Coast

Brian Blanton, John McGee, Jason Fleming, Carola Kaiser, Hartmut Kaiser, Howard Lander, Rick Luettich, Kendra Dresback, Randy Kolar
2012 Procedia Computer Science  
., opportunistic grid computing) in an effort to provide timely guidance for storm surge and wave impacts.  ...  In this paper, we outline the North Carolina Forecasting System (NCFS) for storm surge and waves for coastal North Carolina, which is threatened by tropical cyclones about once every three years.  ...  (WMS) and Web Feature Services (WFS)) (Google Earth files, GeoTIF and shape files, image files for custom visualization applications).  ... 
doi:10.1016/j.procs.2012.04.185 fatcat:pajba5swcvczfiywatpeeopjgm

SMT: An interface for localized storm surge modeling

Tristan Dyer, John Baugh
2016 Advances in Engineering Software  
The devastation wrought by Hurricanes Katrina (2005), Ike (2008), and Sandy (2012) in recent years continues to underscore the need for better prediction and preparation in the face of storm surge and  ...  Simulations of coastal flooding using physically based hydrodynamic codes like ADCIRC, while very accurate, are also computationally expensive, making them impractical for iterative design scenarios that  ...  We also thank Alper Altuntas for his work generating both data and images, and Lake Trask for his ongoing work in developing mesh editing tools for SMT.  ... 
doi:10.1016/j.advengsoft.2015.10.003 fatcat:w2qjz2faczdotgbdnx7kf44x5e

Quantitative Analysis of Apache Storm Applications: The NewsAsset Case Study

José I. Requeno, José Merseguer, Simona Bernardi, Diego Perez-Palacin, Giorgos Giotis, Vasilis Papanikolaou
2018 Information Systems Frontiers  
In addition, we converted UML into a domain-specific modeling language (DSML) for Apache Storm, thus creating a profile for Storm.  ...  Technologies like Apache Storm can help enormously in this context.  ...  For this reason, we defined in Section 3 a DSML for Apache Storm applications.  ... 
doi:10.1007/s10796-018-9851-x fatcat:626qdqr5r5eojm567dio3ybzki

The Perfect Storm: Examining User Experience and Conducting a Usability Test to Investigate a Disruptive Academic Library Web Site Redevelopment

Darren Chase, Elizabeth Trapasso, Robert Tolliver
2016 Journal of Web Librarianship  
homepage, discovery tool interface, online catalog, and across all the library's Web services.  ...  The researchers conducted a task-based usability test of the effectiveness of online research beginning on the library Web site homepage.  ...  For security purposes, this Google Drive folder was closed to non-research team members after files were uploaded.  ... 
doi:10.1080/19322909.2015.1124740 fatcat:rqpfwv4difghjfy535alklyjfq

Tracing Program Transformations with String Origins [chapter]

Pablo Inostroza, Tijs van der Storm, Sebastian Erdweg
2014 Lecture Notes in Computer Science  
Tracing the execution of such transformations has well-known benefits for debugging, visualization and error reporting.  ...  We illustrate the utility of string origins by presenting data structures and operations for tracing generated code, implementing protected regions, performing name resolution and fixing inadvertent name  ...  In model-driven engineering, models are refined through transformations to produce executable artifacts.  ... 
doi:10.1007/978-3-319-08789-4_12 fatcat:5nqhybzdungbdgdqfqipy4ihhm

The Perfect Storm: Mapping the Life Course Trajectories of Serial Killers

Sasha Reid, Aleece Katan, Ayah Ellithy, Ran Della Stua, Egor V. Denisov
2019 International journal of offender therapy and comparative criminology  
These early environments do not promote secure positive attachments.  ...  The research team ended each round robin session with a refined analysis of each specific theme.  ...  Lack of Application This category will state that the killer did poorly in school due to lack of application during their studies. 0. No 1. Yes GH.  ... 
doi:10.1177/0306624x19838683 pmid:30924386 fatcat:kl5kj7bd7ffqzojq4donn6ucxy

Navigating the Perfect Storm: Research Strategies for Socialecological Systems in a Rapidly Evolving World

John A. Dearing, Seth Bullock, Robert Costanza, Terry P. Dawson, Mary E. Edwards, Guy M. Poppy, Graham M. Smith
2012 Environmental Management  
The 'Perfect Storm' metaphor describes a combination of events that causes a surprising or dramatic impact. It lends an evolutionary perspective to how socialecological interactions change.  ...  Here we consider the implications of an evolutionary perspective for designing research approaches.  ...  Figure 1 was produced following a workshop held at the National Center for Ecological Analysis and Synthesis (NCEAS), Santa Barbara, within the IHDP-IGBP initiative 'Integrating the History and Future  ... 
doi:10.1007/s00267-012-9833-6 pmid:22419399 fatcat:wod5bnkmi5ebrfoe3kf7enzmlm

Brukermedvirkning i samhandling i psykisk helsearbeid

Jorunn Nærland Skjærpe, Margareth Kristoffersen, Marianne Storm
2020 Sykepleien Forskning  
We also thank Kathan Volrath for her thoughtful feedback on the framework development and Tammy Chapman for her assistance in preparing the Atlas.  ...  We thank Chris Stave for his expert guidance on literature and measures searches.  ...  Acknowledgments For their contributions to the original Atlas development, we thank Janice Genevro, David Meyers and Mamatha Pancholi of the Agency for Healthcare Research and Quality (AHRQ) for  ... 
doi:10.4220/sykepleienf.2020.80125 fatcat:b3pqxvwqona7tkmsy4aw7wcpxe

EASY Meta-programming with Rascal [chapter]

Paul Klint, Tijs van der Storm, Jurgen Vinju
2011 Lecture Notes in Computer Science  
Rascal is a new language for meta-programming and is intended to solve problems in the domain of source code analysis and transformation.  ...  Finding security breaches Alice is system administrator of a large online marketplace and she is looking for security breaches in her system. The objects-of-interest are the system's log files.  ...  results. • Templates enable easy code generation. • Functions as values permit programming styles with high re-use. • Generic types allow writing functions that are applicable for many different types  ... 
doi:10.1007/978-3-642-18023-1_6 fatcat:r55dkybhcffrfckj7at5fojjka

Parapsychology [chapter]

Adam J. Rock, Lance Storm, Harvey J. Irwin, Julie Beischel
2013 The Wiley-Blackwell Handbook of Transpersonal Psychology  
External funding for research or for graduate training in transpersonal areas is hard to secure.  ...  Consequently, alternate methods for studying these types of extraordinary phenomena, which are both complex and subtle, may be more appropriate than the superficial applications used by conventional science  ...  this approach is the importance of moving beyond an egocentric concern with one's own individuation or personal spiritual development towards full participation with, commitment to, and responsibility for  ... 
doi:10.1002/9781118591277.ch22 fatcat:wdmcxhb6oncozjtuq422lwvuay

Engineering Language-Parametric End-User Programming Environments for DSLs

Mauricio Verano Merino, Jurgen Vinju, Mark van den Brand, Tijs van der Storm
2022 Zenodo  
Unfortunately, programming languages usually offer a single user interface or syntax, which is not ideal considering different types of users with varied backgrounds and expertise will use it.  ...  These mechanisms rely heavily on reusing existing language components for existing languages or helping language engineers define these interfaces for new languages.  ...  acknowledgements We would like to thank the Twitter hive mind, and Rainer Joswig in particular, for help in navigating the early history of REPLs and the anonymous reviewers for their helpful comments.  ... 
doi:10.5281/zenodo.6302885 fatcat:yr2tjs3rqvef5cftnooxjtbgcu

Piloting the Clinical Value of Wearable Cardiorespiratory Monitoring for People with Cystic Fibrosis [article]

Benjamin Vandendriessche, Bertold Van den Bergh, Valerie Storms, James F Chmiel, Erica A Roesch
2020 medRxiv   pre-print
Wearable devices could provide a way for long-term monitoring of disease progression and early signs of PEx to intervene as early as possible, thereby improving long-term outcomes. Methods.  ...  Determining if a wearable is fit-for-purpose is a long and multidisciplinary process that requires involvement from all stakeholders as early as possible in the development process.  ...  Authorized UHCMC and Byteflies staff could access the data over a secure web interface.  ... 
doi:10.1101/2020.07.27.20151589 fatcat:vzoqaweeendidnhdgpwnnplpku
« Previous Showing results 1 — 15 out of 10,044 results