Co-Living Social Community for Elderly
暂无分享,去创建一个
Bjørn Magnus Mathisen | Anders Kofod-Petersen | Idoia Olalde | A. Kofod-Petersen | B. Mathisen | I. Olalde
[1] Steffen Späthe,et al. Geolocated communication support in rescue management , 2011, ISCRAM.
[2] Yolande Berbers,et al. A Notion of Event Quality for Contextualized Planning and Decision Support Systems , 2011, CONTEXT.
[3] Martin Gilje Jaatun,et al. Reference deployment models for eliminating user concerns on cloud security , 2010, The Journal of Supercomputing.
[4] Åsmund Ahlmann Nyre. Usage Control Enforcement - A Survey , 2011, ARES.
[5] M. Bruce Corp. CHAPTER 12 – Overall System Design , 1990 .
[6] Gerald Eichler,et al. Spree - Trial-based Improvements: Transferring an Enterprise 2.0 into a Web 2.0 Expert Community Application , 2011, IICS.
[7] John Krogstie,et al. A longitudinal study of development and maintenance in Norway: Report from the 2003 investigation , 2006, Inf. Softw. Technol..
[8] J. van Leeuwen,et al. Intelligent Agents V: Agents Theories, Architectures, and Languages , 2003, Lecture Notes in Computer Science.
[9] Rajashree V Biradar,et al. Classification and Comparison of Routing Protocols in Wireless Sensor Networks , 2009 .
[10] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[11] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[12] Herwig Unger,et al. Search Word Extraction Using Extended PageRank Calculations , 2012, Autonomous Systems: Developments and Trends.
[13] Lora Aroyo,et al. The NoTube Beancounter: Aggregating User Data for television Programme Recommendation , 2009, ISWC 2009.
[14] Kenneth L. Mattox,et al. Modeling and Simulation in Terror Medicine , 2009 .
[15] Jimmy J. Lin,et al. Where is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing , 2009, First Monday.
[16] Henry Mintzberg,et al. Managing the care of health and the cure of disease--Part II: Integration. , 2001, Health care management review.
[17] Yoshimichi Sato. Rational choice theory , 2013 .
[18] Marijn Janssen,et al. The Entanglement of Enterprise Architecture and IT-Governance: The Cases of Norway and the Netherlands , 2011, 2011 44th Hawaii International Conference on System Sciences.
[19] Howard M. Heys,et al. Energy efficiency of encryption schemes applied to wireless sensor networks , 2012, Secur. Commun. Networks.
[20] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[21] Adam Dunkels,et al. Increasing ZigBee network lifetime with X-MAC , 2008, REALWSN '08.
[22] Jonna Häkkilä,et al. Let's all get up and walk to the North Pole: design and evaluation of a mobile wellness application , 2010, NordiCHI.
[23] Gerald Eichler,et al. Ad-hoc Community Composition of Rescue Forces in Action Situations , 2010, IICS.
[24] Prashant Palvia,et al. Software maintenance management: Changes in the last decade , 1990, J. Softw. Maintenance Res. Pract..
[25] Valeriy Vyatkin,et al. Toward Digital Ecologies: Intelligent Agent Networks Controlling Interdependent Infrastructures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[26] A. Faxvaag,et al. Process support for risk mitigation: a case study of variability and resilience in vascular surgery , 2011, Quality and Safety in Health Care.
[27] M. S. Blois,et al. What is medical informatics? , 1986, The Western journal of medicine.
[28] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[29] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[30] Roy T. Fielding,et al. Principled design of the modern Web architecture , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[31] Dirk Schönfuß,et al. CONTENTUS—technologies for next generation multimedia libraries , 2011, Multimedia Tools and Applications.
[32] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[33] Marcel Worring,et al. Concept-Based Video Retrieval , 2009, Found. Trends Inf. Retr..
[34] Valentin Tablan,et al. Web-assisted annotation, semantic indexing and search of television and radio news , 2005, WWW '05.
[35] Hajo A. Reijers,et al. Workflow for Healthcare: A Methodology for Realizing Flexible Medical Treatment Processes , 2009, Business Process Management Workshops.
[36] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[37] Marius Mikalsen,et al. Interoperability Services in the MPOWER Ambient Assisted Living Platform , 2009, MIE.
[38] Mahesh K. Marina,et al. On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[39] Michael C. Hout,et al. Multidimensional Scaling , 2003, Encyclopedic Dictionary of Archaeology.
[40] Johan Oomen,et al. Linking Europe's Television Heritage , 2012 .
[41] Alexander M. Bronstein,et al. Multigrid multidimensional scaling , 2006, Numer. Linear Algebra Appl..
[42] George E. Higgins,et al. An Application of Deterrence Theory to Software Piracy , 2005 .
[43] Thomas Steiner. SemWebVid - Making Video a First Class Semantic Web Citizen and a First Class Web Bourgeois , 2010, ISWC Posters&Demos.
[44] Thierry Denoeux,et al. Multidimensional scaling of interval-valued dissimilarity data , 2000, Pattern Recognit. Lett..
[45] Eric Anderson,et al. X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.
[46] Slinger Jansen,et al. A sense of community: A research agenda for software ecosystems , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.
[47] F. P. Wieland,et al. A CONCEPT PROTOTYPE FOR INTEGRATED GAMING AND SIMULATION FOR INCIDENT MANAGEMENT , 2006 .
[48] Harald Sack,et al. A skeleton based binarization approach for video text recognition , 2012, 2012 13th International Workshop on Image Analysis for Multimedia Interactive Services.
[49] John Krogstie,et al. A study of development and maintenance in Norway: assessing the efficiency of information systems support using functional maintenance , 2000, Inf. Softw. Technol..
[50] Subhash C. Kak,et al. Online data storage using implicit security , 2009, Inf. Sci..
[51] Xiping Song,et al. Managing exceptions in the medical workflow systems , 2006, ICSE.
[52] Radu State,et al. Management of Ad-Hoc Networks , 2008 .
[53] P. Sheeran,et al. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .
[54] Ai-Chun Pang,et al. A comprehensive study of low-power operation in ieee 802.15.4 , 2007, MSWiM '07.
[55] Andreas Schwill,et al. Lernen im digitalen Zeitalter - DeLFI 2009, die 7. E-Learning-Fachtagung Informatik der Gesellschaft für Informatik e.V., 14. - 17. September 2009 an der Freien Universität Berlin , 2009, DeLFI.
[56] Angelos Bilas,et al. Providing security to the Desktop Data Grid , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[57] Abigail Sellen,et al. User sketches: a quick, inexpensive, and effective way to elicit more reflective user feedback , 2006, NordiCHI '06.
[58] R. W. Rogers,et al. A meta-analysis of research on protection motivation theory. , 2000 .
[59] Gerald Eichler,et al. Simulation of wireless, self-organizingandagent-based dynamic communication scenarios , 2012, ISCRAM.
[60] Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt , 2012, Sicherheit.
[61] Peter Loos,et al. BPM-in-the-Large - Towards a Higher Level of Abstraction in Business Process Management , 2010, EGES/GISP.
[62] Martin Gilje Jaatun,et al. A farewell to trust: An approach to confidentiality control in the Cloud , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[63] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[64] K. Mani Chandy,et al. Event Processing - Designing IT Systems for Agile Companies , 2009 .
[65] Azzedine Boukerche,et al. Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks , 2004, Mob. Networks Appl..
[66] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[67] Gabriela Csurka,et al. Visual categorization with bags of keypoints , 2002, eccv 2004.
[68] Hacène Fouchal,et al. Efficient Communications over Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[69] Roberto Basili,et al. Creating Rich Metadata in the TV Broadcast Archives Environment: The PrestoSpace Project , 2006, 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'06).
[70] Wolfgang Prinz,et al. What Happened to our Document in the Shared Workspace? The Need for Groupware Conventions , 1997, INTERACT.
[71] U. Quasthoff,et al. The Poisson Collocation Measure and its Applications , 2002 .
[72] Eric Horvitz,et al. Collaborative Filtering by Personality Diagnosis: A Hybrid Memory and Model-Based Approach , 2000, UAI.
[73] Michael Herczeg,et al. NEMO: the network environment for multimedia objects , 2010, IITM '10.
[74] Harald Sack,et al. The Path is the Destination - Enabling a New Search Paradigm with Linked Data , 2010, LDSI@FIA.
[75] Aditya Goel,et al. Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol , 2009 .
[76] Harald Sack,et al. Named Entity Recognition for User-Generated Tags , 2011, 2011 22nd International Workshop on Database and Expert Systems Applications.
[77] Abdellatif Mtibaa,et al. Video shot boundary detection using motion activity descriptor , 2010, ArXiv.
[78] Donald A. Adjeroh,et al. Adaptive Edge-Oriented Shot Boundary Detection , 2009, EURASIP J. Image Video Process..
[79] J. Kruskal. Nonmetric multidimensional scaling: A numerical method , 1964 .
[80] Abigail Sellen,et al. Getting the right design and the design right , 2006, CHI.
[81] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[82] Toni C. Antonucci,et al. Social Networks, Support, and Integration , 2007 .
[83] Norbert Wehn,et al. Energy modelling in sensor networks , 2007 .
[84] Amit N. Thakare,et al. Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks , 2010 .
[85] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[86] A. Mahmood,et al. Factors Influencing Protection Motivation and IS Security Policy Compliance , 2006, 2006 Innovations in Information Technology.
[87] C. V. Ramamoorthy,et al. Social and Expert Research in Online Communities , 2010 .
[88] Volkmar Schau. Ellipsis - Konzeption und Implementierung einer vereinheitlichten und leistungsfähigen Architektur für Multi-Agenten-Systeme (MAS) auf Basis frei verfügbarer IT-Infrastrukturkomponenten unter besonderer Berücksichtigung internationaler Standards , 2012 .
[89] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[90] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[91] Martin Gilje Jaatun,et al. A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[92] Robert P. Minch,et al. Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[93] John Krogstie,et al. Process Modeling Value Framework , 2006, ICEIS.
[94] Bastian Ulke,et al. Navigation in the P2Life Networked Virtual Marketplace Environment , 2012, Autonomous Systems: Developments and Trends.
[95] Mikko T. Siponen,et al. Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.
[96] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[97] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[98] Paul Dourish,et al. Taking the work out of workflow: Mechanisms for document-centered collaboration , 1999, ECSCW.
[99] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[100] B. McCarthy. NEW ECONOMICS OF SOCIOLOGICAL CRIMINOLOGY , 2002 .
[101] Rafael A. Gonzalez. Crisis response simulation combining discrete-event and agent-based modeling , 2009 .
[102] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[103] Alan L. Rector,et al. Editing Description Logic Ontologies with the Protégé OWL Plugin , 2004, Description Logics.
[104] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[105] Eric Grosse,et al. Cloud Computing Roundtable , 2010, IEEE Security & Privacy Magazine.
[106] Cordelia Schmid,et al. Local Features and Kernels for Classification of Texture and Object Categories: A Comprehensive Study , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[107] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[108] Alan Cooper,et al. About Face 3: the essentials of interaction design , 1995 .
[109] Maria Calle,et al. MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation , 2012, Int. J. Distributed Sens. Networks.
[110] Alan L. Rector,et al. MEDICAL INFORMATICS , 1990, The Lancet.
[111] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[112] R. Cardell-Oliver,et al. Field testing a wireless sensor network for reactive environmental monitoring [soil moisture measurement] , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..
[113] Ted Dunning,et al. Accurate Methods for the Statistics of Surprise and Coincidence , 1993, CL.
[114] Timothy Roscoe,et al. Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.
[115] Yonatan Wexler,et al. Detecting text in natural scenes with stroke width transform , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[116] Gerard Salton,et al. A vector space model for automatic indexing , 1975, CACM.
[117] Adi Shamir,et al. How to share a secret , 1979, CACM.
[118] Haojin Yang,et al. Text detection in video images using adaptive edge detection and Stroke Width verification , 2012, 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP).
[119] Martin Gilje Jaatun,et al. Deliverance from trust through a Redundant Array of Independent Net-storages in Cloud Computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[120] John Krogstie,et al. Integrated Quality of Models and Quality of Maps , 2009, BMMDS/EMMSAD.
[121] E. Burton Swanson,et al. Characteristics of application software maintenance , 1978, CACM.
[122] Harald Wesenberg. Enterprise Modeling in an Agile World , 2011, PoEM.
[123] Mica R. Endsley,et al. Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[124] Charles R. McLean,et al. Towards standards for integrated gaming and simulation for incident management , 2007, SCSC.
[125] Tejaswini Herath,et al. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..
[126] John Krogstie,et al. Assessing Business Process Modeling Languages Using a Generic Quality Framework , 2006 .
[127] Ulrik Brandes,et al. Social Networks , 2013, Handbook of Graph Drawing and Visualization.
[128] John Krogstie,et al. Interactive Models for Supporting Networked Organisations , 2004, CAiSE.
[129] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[130] J. Leeuw. Applications of Convex Analysis to Multidimensional Scaling , 2000 .
[131] John Krogstie,et al. Information Systems Engineering: Conceptual Modeling in a quality perspective , 2003 .
[132] John Krogstie,et al. A longitudinal study of development and maintenance , 2010, Inf. Softw. Technol..
[133] M. Guechari,et al. Dynamic solution for detecting Denial of Service attacks in wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[134] Weiyi Zhang,et al. A secured cost-effective multi-cloud storage in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[135] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[136] Kevin Li,et al. Faceted metadata for image search and browsing , 2003, CHI '03.
[137] Arslan Brömme,et al. BIOSIG 2007: biometrics and electronic signatures , 2007 .
[138] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[139] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[140] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[141] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[142] Witold Dzwinel,et al. Parallel Implementation of Multidimensional Scaling Algorithm Based on Particle Dynamics , 2009, PPAM.
[143] Manfred Tscheligi,et al. Paper prototyping - what is it good for?: a comparison of paper- and computer-based low-fidelity prototyping , 2003, CHI Extended Abstracts.
[144] L. R. Dice. Measures of the Amount of Ecologic Association Between Species , 1945 .
[145] Michael Herczeg,et al. Software-Ergonomie: Theorien, Modelle und Kriterien für gebrauchstaugliche interaktive Computersysteme , 2009 .
[146] Wil M. P. van der Aalst,et al. Intra- and Inter-Organizational Process Mining: Discovering Processes within and between Organizations , 2011, PoEM.
[147] J. Kruskal. Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis , 1964 .
[148] Irene Woon,et al. A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.
[149] John Krogstie,et al. Software maintenance in Norway: a survey investigation , 1994, Proceedings 1994 International Conference on Software Maintenance.
[150] Jalel Ben-Othman,et al. Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..
[151] Peter Braun,et al. Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .
[152] Harald Sack,et al. Towards exploratory video search using linked data , 2009, 2009 11th IEEE International Symposium on Multimedia.
[153] Gerald Eichler,et al. Self Organization in Enterprise 2.0 Communities: To Introduce a New Experts' Exchange Application , 2012, Autonomous Systems: Developments and Trends.
[154] L. G. Tornatzky,et al. Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.
[155] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..