Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring (Englisch)
- Neue Suche nach: Nunez-Redo, M.
- Neue Suche nach: Diaz, L.
- Neue Suche nach: Gil, J.
- Neue Suche nach: Gonzalez, D.
- Neue Suche nach: Huerta, J.
- Neue Suche nach: Nunez-Redo, M.
- Neue Suche nach: Diaz, L.
- Neue Suche nach: Gil, J.
- Neue Suche nach: Gonzalez, D.
- Neue Suche nach: Huerta, J.
- Neue Suche nach: Tjoa, A Min
In:
International Cross Domain Conference and Workshop; Availability, Reliability and Security for business, enterprise and health information systems: IFIP WG 8.4/8.9
6908
;
50-68
;
2011
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire Monitoring
-
Beteiligte:Nunez-Redo, M. ( Autor:in ) / Diaz, L. ( Autor:in ) / Gil, J. ( Autor:in ) / Gonzalez, D. ( Autor:in ) / Huerta, J. ( Autor:in ) / Tjoa, A Min
-
Kongress:International Cross Domain Conference and Workshop; Availability, Reliability and Security for business, enterprise and health information systems: IFIP WG 8.4/8.9 ; 2011 ; Vienna, Austria
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 6908 ; 50-68
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:19 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online. ARES 2011.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Benefits of Federated Identity Management - A Survey from an Integrated Operations ViewpointJensen, J. et al. | 2011
- 13
-
A Security Policy Model for Agent Based Service-Oriented ArchitecturesHermann, E. et al. | 2011
- 26
-
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare SettingLine, M.B. / Tondel, I.A. / Gjaere, E.A. et al. | 2011
- 38
-
Usage Control Enforcement - A SurveyNyre, A.A. et al. | 2011
- 50
-
Discovery and Integration of Web 2.0 Content into Geospatial Information Infrastructures: A Use Case in Wild Fire MonitoringNunez-Redo, M. / Diaz, L. / Gil, J. / Gonzalez, D. / Huerta, J. et al. | 2011
- 69
-
The Problem of Conceptual Incompatibility: Exploring the Potential of Conceptual Data Independence to Ease Data IntegrationMcGinnes, S. et al. | 2011
- 82
-
Health Care Reform and the InternetMacTaggart, P. / Fiore, S. et al. | 2011
- 89
-
Integrating Patient-Related Entities Using Hospital Information System Data and Automatic Analysis of Free TextBoytcheva, S. / Angelova, G. / Angelov, Z. / Tcharaktchiev, D. / Dimitrov, H. et al. | 2011
- 102
-
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) ApplicationsSahay, R. / Fox, R. / Zimmermann, A. / Polleres, A. / Hauswirth, M. et al. | 2011
- 118
-
Application of Answer Set Programming for Public Health Data Integration and AnalysisNogueira, M.L. / Greis, N.P. et al. | 2011
- 135
-
Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion DetectionHachaj, T. / Ogiela, M.R. et al. | 2011
- 149
-
Hierarchical Knowledge Structure Applied to Image Analyzing System - Possibilities of Practical UsageWojcik, K. et al. | 2011
- 164
-
Evaluation of Topological Vulnerability of the Internet under Regional FailuresPeng, W. / Li, Z. / Su, J. / Dong, M. et al. | 2011
- 176
-
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and LossSato, M. / Yamauchi, T. et al. | 2011
- 191
-
Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack DetectionFlammini, F. / Mazzocca, N. / Pappalardo, A. / Pragliola, C. / Vittorini, V. et al. | 2011
- 205
-
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things DevicesMarin, L. / Jara, A.J. / Skarmeta, A.F.G. et al. | 2011
- 220
-
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological ChangesTrzupek, M. et al. | 2011
- 228
-
Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian NetworkZhao, W. / Kwon, G.-R. / Lee, S.-W. et al. | 2011
- 243
-
Extended Spatio-temporal Relations between Moving and Non-moving ObjectsChoi, C. / Choi, J. / Shin, J. / You, I. / Kim, P. et al. | 2011
- 255
-
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless NetworksLeu, F.-Y. / Ciou, Y.-F. / Huang, Y.-L. et al. | 2011
- 271
-
Securing Location-Aware Services Based on Online/Offline Signatures in VANETsSur, C. / Park, Y. / Nishide, T. / Sakurai, K. / Rhee, K.H. et al. | 2011
- 286
-
A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic AnalysisDoyoddorj, M. / Rhee, K.-H. et al. | 2011
- 295
-
Learning Web Application Firewall - Benefits and CaveatsPalka, D. / Zachara, M. et al. | 2011
- 309
-
A Novel Chaining Approach to Indirect Control Transfer InstructionsChen, W. / Wang, Z. / Dou, Q. / Wang, Y. et al. | 2011
- 321
-
A Study on Context Services Model with Location PrivacyKo, H. / Marreiros, G. / Vale, Z. / Choi, J. et al. | 2011
- 330
-
Digital Profiling: A Computer Forensics ApproachColombini, C. / Colella, A. et al. | 2011
- 344
-
New Steganographic Techniques for the OOXML File FormatCastiglione, A. / D Alessio, B. / De Santis, A. / Palmieri, F. et al. | 2011
- 359
-
Automated Construction of a False Digital AlibiDe Santis, A. / Castiglione, A. / Cattaneo, G. / De Maio, G. / Ianulardo, M. et al. | 2011
- 374
-
IT Issues on Homeland Security and DefenseYim, K. / You, I. et al. | 2011