A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
STORM - Collaborative Security Management Environment
[chapter]
2011
Lecture Notes in Computer Science
Identifying these weaknesses and exploiting advanced open-source technologies and interactive software tools, we propose a secure, collaborative environment (STORM) for the security management of ICS's ...
Security Management is a necessary process in order to obtain an accurate security policy for Information and Communication Systems (ICS). ...
The authors would like to thank the GSRT for funding the S-Port project, and the E.C. for funding the ImmigrationPolicy2.0 project. ...
doi:10.1007/978-3-642-21040-2_23
fatcat:qmgepfhmgvdtffao7com65kxjy
Digitalisation and COVID-19: The Perfect Storm
2020
Biomedicine Hub
Instead of sailing bravely into battle, it remains at the dockside, cowering from the storm beyond the breakwaters. ...
already deeply engaged in a rescue mission for the whole of the human race. ...
Acknowledgements We would like to thank the members of the European Alliance for Personalised Medicine, Million European Genome Alliance+ (MEGA+), and express thanks to the contribution from the consortium ...
doi:10.1159/000511232
pmid:33564668
pmcid:PMC7573902
fatcat:c7nyha3v45c77dteo4l3vdm6ya
Consolidated storm prediction for aviation (CoSPA)
2008
2008 Integrated Communications, Navigation and Surveillance Conference
Need to provide reliable forecast uncertainties for the storm predictions to be useful. 6. ...
Permeability of storms an important factor to the user (drives the need for digital 4D depiction of the storm volume in the consolidated product). 8. ...
, using heuristic and numerical models, for aviation applications. ...
doi:10.1109/icnsurv.2008.4559190
fatcat:d2g3sjcn5zhbpn5kb4onbvhpke
Urgent Computing of Storm Surge for North Carolina's Coast
2012
Procedia Computer Science
., opportunistic grid computing) in an effort to provide timely guidance for storm surge and wave impacts. ...
In this paper, we outline the North Carolina Forecasting System (NCFS) for storm surge and waves for coastal North Carolina, which is threatened by tropical cyclones about once every three years. ...
(WMS) and Web Feature Services (WFS)) (Google Earth files, GeoTIF and shape files, image files for custom visualization applications). ...
doi:10.1016/j.procs.2012.04.185
fatcat:pajba5swcvczfiywatpeeopjgm
SMT: An interface for localized storm surge modeling
2016
Advances in Engineering Software
The devastation wrought by Hurricanes Katrina (2005), Ike (2008), and Sandy (2012) in recent years continues to underscore the need for better prediction and preparation in the face of storm surge and ...
Simulations of coastal flooding using physically based hydrodynamic codes like ADCIRC, while very accurate, are also computationally expensive, making them impractical for iterative design scenarios that ...
We also thank Alper Altuntas for his work generating both data and images, and Lake Trask for his ongoing work in developing mesh editing tools for SMT. ...
doi:10.1016/j.advengsoft.2015.10.003
fatcat:w2qjz2faczdotgbdnx7kf44x5e
Quantitative Analysis of Apache Storm Applications: The NewsAsset Case Study
2018
Information Systems Frontiers
In addition, we converted UML into a domain-specific modeling language (DSML) for Apache Storm, thus creating a profile for Storm. ...
Technologies like Apache Storm can help enormously in this context. ...
For this reason, we defined in Section 3 a DSML for Apache Storm applications. ...
doi:10.1007/s10796-018-9851-x
fatcat:626qdqr5r5eojm567dio3ybzki
The Perfect Storm: Examining User Experience and Conducting a Usability Test to Investigate a Disruptive Academic Library Web Site Redevelopment
2016
Journal of Web Librarianship
homepage, discovery tool interface, online catalog, and across all the library's Web services. ...
The researchers conducted a task-based usability test of the effectiveness of online research beginning on the library Web site homepage. ...
For security purposes, this Google Drive folder was closed to non-research team members after files were uploaded. ...
doi:10.1080/19322909.2015.1124740
fatcat:rqpfwv4difghjfy535alklyjfq
Tracing Program Transformations with String Origins
[chapter]
2014
Lecture Notes in Computer Science
Tracing the execution of such transformations has well-known benefits for debugging, visualization and error reporting. ...
We illustrate the utility of string origins by presenting data structures and operations for tracing generated code, implementing protected regions, performing name resolution and fixing inadvertent name ...
In model-driven engineering, models are refined through transformations to produce executable artifacts. ...
doi:10.1007/978-3-319-08789-4_12
fatcat:5nqhybzdungbdgdqfqipy4ihhm
The Perfect Storm: Mapping the Life Course Trajectories of Serial Killers
2019
International journal of offender therapy and comparative criminology
These early environments do not promote secure positive attachments. ...
The research team ended each round robin session with a refined analysis of each specific theme. ...
Lack of Application This category will state that the killer did poorly in school due to lack of application during their studies. 0. No 1. Yes
GH. ...
doi:10.1177/0306624x19838683
pmid:30924386
fatcat:kl5kj7bd7ffqzojq4donn6ucxy
Navigating the Perfect Storm: Research Strategies for Socialecological Systems in a Rapidly Evolving World
2012
Environmental Management
The 'Perfect Storm' metaphor describes a combination of events that causes a surprising or dramatic impact. It lends an evolutionary perspective to how socialecological interactions change. ...
Here we consider the implications of an evolutionary perspective for designing research approaches. ...
Figure 1 was produced following a workshop held at the National Center for Ecological Analysis and Synthesis (NCEAS), Santa Barbara, within the IHDP-IGBP initiative 'Integrating the History and Future ...
doi:10.1007/s00267-012-9833-6
pmid:22419399
fatcat:wod5bnkmi5ebrfoe3kf7enzmlm
Brukermedvirkning i samhandling i psykisk helsearbeid
2020
Sykepleien Forskning
We also thank Kathan Volrath for her thoughtful feedback on the framework development and Tammy Chapman for her assistance in preparing the Atlas. ...
We thank Chris Stave for his expert guidance on literature and measures searches. ...
Acknowledgments For their contributions to the original Atlas development, we thank Janice Genevro, David Meyers and Mamatha Pancholi of the Agency for Healthcare Research and Quality (AHRQ) for ...
doi:10.4220/sykepleienf.2020.80125
fatcat:b3pqxvwqona7tkmsy4aw7wcpxe
EASY Meta-programming with Rascal
[chapter]
2011
Lecture Notes in Computer Science
Rascal is a new language for meta-programming and is intended to solve problems in the domain of source code analysis and transformation. ...
Finding security breaches Alice is system administrator of a large online marketplace and she is looking for security breaches in her system. The objects-of-interest are the system's log files. ...
results. • Templates enable easy code generation. • Functions as values permit programming styles with high re-use. • Generic types allow writing functions that are applicable for many different types ...
doi:10.1007/978-3-642-18023-1_6
fatcat:r55dkybhcffrfckj7at5fojjka
Parapsychology
[chapter]
2013
The Wiley-Blackwell Handbook of Transpersonal Psychology
External funding for research or for graduate training in transpersonal areas is hard to secure. ...
Consequently, alternate methods for studying these types of extraordinary phenomena, which are both complex and subtle, may be more appropriate than the superficial applications used by conventional science ...
this approach is the importance of moving beyond an egocentric concern with one's own individuation or personal spiritual development towards full participation with, commitment to, and responsibility for ...
doi:10.1002/9781118591277.ch22
fatcat:wdmcxhb6oncozjtuq422lwvuay
Engineering Language-Parametric End-User Programming Environments for DSLs
2022
Zenodo
Unfortunately, programming languages usually offer a single user interface or syntax, which is not ideal considering different types of users with varied backgrounds and expertise will use it. ...
These mechanisms rely heavily on reusing existing language components for existing languages or helping language engineers define these interfaces for new languages. ...
acknowledgements We would like to thank the Twitter hive mind, and Rainer Joswig in particular, for help in navigating the early history of REPLs and the anonymous reviewers for their helpful comments. ...
doi:10.5281/zenodo.6302885
fatcat:yr2tjs3rqvef5cftnooxjtbgcu
Piloting the Clinical Value of Wearable Cardiorespiratory Monitoring for People with Cystic Fibrosis
[article]
2020
medRxiv
pre-print
Wearable devices could provide a way for long-term monitoring of disease progression and early signs of PEx to intervene as early as possible, thereby improving long-term outcomes. Methods. ...
Determining if a wearable is fit-for-purpose is a long and multidisciplinary process that requires involvement from all stakeholders as early as possible in the development process. ...
Authorized UHCMC and Byteflies staff could access the data over a secure web interface. ...
doi:10.1101/2020.07.27.20151589
fatcat:vzoqaweeendidnhdgpwnnplpku
« Previous
Showing results 1 — 15 out of 10,044 results