• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 51
Next 10 →

Indicators for Social and Economic Coping Capacity - Moving Toward a Working Definition of Adaptive Capacity”, Wesleyan-CMU Working Paper.

by Gary Yohe , Richard S J Tol , Gary Yohe , 2001
"... Abstract This paper offers a practically motivated method for evaluating systems' abilities to handle external stress. The method is designed to assess the potential contributions of various adaptation options to improving systems' coping capacities by focusing attention directly on the u ..."
Abstract - Cited by 109 (14 self) - Add to MetaCart
thresholds if it were adopted. The potential contribution of any adaptation to a system's social and economic coping capacity can then, finally, be defined as the simple product of its overall feasibility factor and its efficacy factor; i.e., PCC j ≡ {EF j }{FF j }. Any method that focuses attention

Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:

by Sebastian Fritsch, Dipl Ing, Vangelis Karatsiolis Erklärung , 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract - Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law

zbw Leibniz-Informationszentrum WirtschaftLeibniz Information Centre for Economics

by unknown authors , 2002
"... Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle ..."
Abstract - Add to MetaCart
Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle

Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems

by Piotr K. Tysowski, M. Anwarul Hasan
"... Cloud computing is a distributed computing model in which clients pay for computing and data storage resources of a third-party cloud provider. Cloud applications can scale up or down almost instantly to meet real-time computational demands. Despite the economic advantages of a pay-on-demand busines ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
-constrained mobile devices in extremely large numbers simultaneously; these characteristics lead to difficulties in achieving efficient and highly scalable key management. In this work, at first, leading models for key distribution are applied to a cloud computing system. The underlying schemes include identity

unknown title

by Pasquale De Meo A, Giovanni Quattrone A, Giorgio Terracina B, Domenico Ursino A
"... IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1 ..."
Abstract - Add to MetaCart
IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1

BDRS PRICE DESCRIPTOR,

by unknown authors
"... This report focuses on the evidence about the health.consequences of smoking for women, and is intended to serve.the public health and medical communities as 'a unified source of existing scientific research. The major issues about tobacco use and women's health are examined, including tre ..."
Abstract - Add to MetaCart
This report focuses on the evidence about the health.consequences of smoking for women, and is intended to serve.the public health and medical communities as 'a unified source of existing scientific research. The major issues about tobacco use and women's health are examined, including

Dissertação submetida como requisito parcial para obtenção do grau de Mestre em Finanças

by Áurea Ponte Marques
"... An approach based on Extreme Value Theory as a measure to quantify market risk of equity securities and portfolios ..."
Abstract - Add to MetaCart
An approach based on Extreme Value Theory as a measure to quantify market risk of equity securities and portfolios

4. TITLE AND SUBTITLE A Practical Theory of Micro-Solar Power Sensor Networks

by Jaein Jeong , 2009
"... Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract - Add to MetaCart
regarding this burden estimate or any other aspect of this collection of information,

Study of the Tail Dependence Structure in Global Financial Markets Using Extreme Value Theory

by Jian Wua, Zhengjun Zhangb, Yong Zhaoc
"... Abstract: The presence of tail dependencies invalidates the multivariate normality assumptions in portfolio risk management. The identification of tail (in)dependencies has drawn major attention in empirical financial studies. Yet it is still a challenging issue both theoretically and practically. P ..."
Abstract - Add to MetaCart
Abstract: The presence of tail dependencies invalidates the multivariate normality assumptions in portfolio risk management. The identification of tail (in)dependencies has drawn major attention in empirical financial studies. Yet it is still a challenging issue both theoretically and practically
Next 10 →
Results 1 - 10 of 51
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University