10,919 research outputs found
Information Outlook, June 1997
Volume 1, Issue 6https://scholarworks.sjsu.edu/sla_io_1997/1005/thumbnail.jp
Recommended from our members
A twoâstep authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
Social Shaping Leadership in Enterprise System Acquisition and Development: The Influence of Reference Users in Xizi Holdings
Acquisition and development remains an important aspect of enterprise systems research. In practice, it means reference users interact in and across organizations to fill gaps in knowledge and offer their experience as models or standards for others. Despite their importance, how reference users influence the acquisition process and the role of IT in its development have received scant attention. This paper presents a study of how reference users shape and lead the acquisition and development of enterprise systems (ES). We derive our findings from investigating and conducting a case study on Xizi Holdings, one of the largest private enterprises in China. Our model deploys a theoretical lens of the social shaping of technology in the context of inter-organizational ES adoption. We build the model on stage-wise observations of the roles that reference users play across the ES acquisition and development process in Xizi, and how Xizi brings together hundreds of autonomous IT systems across 128 subsidiaries under one enterprise-wide vision. Our study model identifies three intermediary mechanisms (i.e., attaching, staging, and shaping of technology) that reference users in the process of negotiating ES acquisition and development enable
Bridges Structural Health Monitoring and Deterioration Detection Synthesis of Knowledge and Technology
INE/AUTC 10.0
Web-based Spatial Decision Support Systems (WebSDSS): Evolution, Architecture, Examples and Challenges
Spatial Decision Support Systems (SDSS), which support spatial analysis and decision making, are currently receiving much attention. Research on SDSS originated from two distinct sources, namely, the GIS community and the DSS community. The synergy between these two research groups has lead to the adoption of state of the art technical solutions and the development of sophisticated SDSS that satisfy the needs of geographers and top-level decision makers. Recently, the Web has added a new dimension to SDSS and Web-based SDSS (WebSDSS) that are being developed in a number of application domains. This article provides an overview of the emergence of SDSS, its architecture and applications, and discusses some of the enabling technologies and research challenges for future SDSS development and deployment
Infrastructure and the Remaking of Asia
Infrastructure and the Remaking of Asia offers a new understanding of how technological innovation, geopolitical ambitions, and social change converge and cross-fertilize one another through infrastructure projects in Asia. This volume powerfully illustrates the multifaceted connections between infrastructure and three global paradigm shifts: climate change, digitalization, and Chinaâs emergence as a superpower. Drawing on fine-grained analyses of airports, highways, pipelines, and digital communication systems, the book investigates infrastructure both âfrom above,â as perceived by experts and decision makers, and âfrom below,â as experienced by middlemen, laborers, and everyday users. In so doing, it provides groundbreaking insights into infrastructureâs planning, production, and operation.
Focusing on cities and regions across Asia, the volume combines ten tightly interwoven case studies, from the Bosphorus to Beijing and from the Indonesian archipelago to the Arctic. Written by leading global infrastructure experts in the fields of anthropology, architecture, geography, history, science and technology studies, and urban planning, the book establishes a dialogue between scholarly approaches to infrastructure and the more operational perspective of the professionals who design and build it. This multidisciplinary method sheds light on the practitionersâ mindset, while also attending to the materiality and agency of the infrastructures that they create. Infrastructure and the Remaking of Asia is conceived as an act of translation: linking up relatedâyet thus far disconnectedâresearch across a variety of academic disciplines, while making those insights accessible to a wider audience of students, infrastructure professionals, and the general public
Personalizing the web: A tool for empowering end-users to customize the web through browser-side modification
167 p.Web applications delegate to the browser the final rendering of their pages. Thispermits browser-based transcoding (a.k.a. Web Augmentation) that can be ultimately singularized for eachbrowser installation. This creates an opportunity for Web consumers to customize their Web experiences.This vision requires provisioning adequate tooling that makes Web Augmentation affordable to laymen.We consider this a special class of End-User Development, integrating Web Augmentation paradigms.The dominant paradigm in End-User Development is scripting languages through visual languages.This thesis advocates for a Google Chrome browser extension for Web Augmentation. This is carried outthrough WebMakeup, a visual DSL programming tool for end-users to customize their own websites.WebMakeup removes, moves and adds web nodes from different web pages in order to avoid tabswitching, scrolling, the number of clicks and cutting and pasting. Moreover, Web Augmentationextensions has difficulties in finding web elements after a website updating. As a consequence, browserextensions give up working and users might stop using these extensions. This is why two differentlocators have been implemented with the aim of improving web locator robustness
- âŠ