• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 915
Next 10 →

ADEPT flex - Supporting Dynamic Changes of Workflows Without Loosing Control

by Manfred Reichert, Peter Dadam - Journal of Intelligent Information Systems , 1998
"... . Today's workflow management systems (WFMSs) are only applicable in a secure and safe manner if the business process (BP) to be supported is well-structured and there is no need for ad hoc deviations at runtime. As only few BPs are static in this sense, this significantly limits the applicabil ..."
Abstract - Cited by 425 (112 self) - Add to MetaCart
. Today's workflow management systems (WFMSs) are only applicable in a secure and safe manner if the business process (BP) to be supported is well-structured and there is no need for ad hoc deviations at runtime. As only few BPs are static in this sense, this significantly limits

Nanotechnology: The Next Big Thing, or Much Ado about Nothing?

by Andrew D. Maynard , 2006
"... Nanotechnology encompasses an increasingly sophisticated ability to manipulate matter at the nanoscale, resulting in new materials, products and devices that demonstrate new and unusual behaviour. While emerging nanotechnologies have great potential for good, there are increasing concerns that the s ..."
Abstract - Cited by 23 (1 self) - Add to MetaCart
and management. People involved in making and using these materials need to know what the risks are and how to manage them, if safe nanotechnology-based businesses are to emerge. Yet the challenges faced by the occupational hygiene community in ensuring safe nano-workplaces are substantial. We currently know

Dual Busy Tone Multiple Access (DBTMA) - A Multiple Access Control Scheme for Ad Hoc Networks

by Zygmunt J. Haas, Senior Member, Jing Deng, Student Member - IEEE Transactions on Communications , 2002
"... In ad hoc networks, the hidden- and the exposed-terminal problems can severely reduce the network capacity on the MAC layer. To address these problems, the ready-to-send and clear-to-send (RTS/CTS) dialogue has been proposed in the literature. However, MAC schemes using only the RTS/CTS dialogue can ..."
Abstract - Cited by 302 (13 self) - Add to MetaCart
cannot completely solve the hidden and the exposed terminal problems, as pure "packet sensing" MAC schemes are not safe even in fully connected networks. We propose a new MAC protocol, termed the dual busy tone multiple access (DBTMA) scheme. The operation of the DBTMA protocol is based

Automated trust negotiation

by William H. Winsborough, Ninghui Li - In DARPA Information Survivability Conference and Exposition, volume I , 2000
"... Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as poten ..."
Abstract - Cited by 241 (18 self) - Add to MetaCart
Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
/consumption, experience, and power, as expressed in meaningful interaction framed by culture. By Information Age I refer to a historical period in which human societies perform their activities in a technological paradigm constituted around microelectronics-based information/communication technologies, and genetic

SAFE BOSSES? SAFE WORKERS? SAFETY CULTURE IN SMALL CONSTRUCTION INDUSTRY BUSINESSES

by Dr. Noni Holmes
"... Safety cultures that either promote or impede occupational health and safety (OHS) are shaped by the interaction of factors in the social and physical working environments and individuals ’ perceptions and behaviours. A good safety culture facilitates the implementation and maintenance of risk contr ..."
Abstract - Add to MetaCart
Safety cultures that either promote or impede occupational health and safety (OHS) are shaped by the interaction of factors in the social and physical working environments and individuals ’ perceptions and behaviours. A good safety culture facilitates the implementation and maintenance of risk control measures. Technical definitions of risk conceptualise it as a probabilistic expression of hazard potential in OHS1-3.

Promoting the development of safe products based on nanotechnology: The NANOSEGUR project initiative (Basque Country-Spain)

by J M López De Ipiña , P Iriondo , C Vaquero , C Gutiérrez Cañas
"... Nanotechnology offers promising innovations and great benefits in many industrial sectors contributing to improve our quality of live. Nowadays, more than 800 consumer products in the market include engineered nanomaterials (ENM) in their formulations In agreement with other countries as USA or Ja ..."
Abstract - Add to MetaCart
Nanotechnology offers promising innovations and great benefits in many industrial sectors contributing to improve our quality of live. Nowadays, more than 800 consumer products in the market include engineered nanomaterials (ENM) in their formulations In agreement with other countries as USA

The HR Audit for Legal Compliance and Safe Business Practices

by Joan Curtice
"... ..."
Abstract - Add to MetaCart
Abstract not found

Safe Communities ~ Safe Schools FACT SHEET

by unknown authors
"... A safe school plan is a framework for action that can be used as a guide for current and future planning. It addresses both the behavioral and property protection aspects of violence prevention. The goal of safe school planning is to create and maintain a positive and welcoming school climate, free ..."
Abstract - Add to MetaCart
A safe school plan is a framework for action that can be used as a guide for current and future planning. It addresses both the behavioral and property protection aspects of violence prevention. The goal of safe school planning is to create and maintain a positive and welcoming school climate, free

Safe Communities ~ Safe Schools FACT SHEET

by unknown authors
"... A safe school plan is a framework for action that can be used as a guide for current and future planning. It addresses both the behavioral and property protection aspects of violence prevention. The goal of safe school planning is to create and maintain a positive and welcoming school climate, free ..."
Abstract - Add to MetaCart
A safe school plan is a framework for action that can be used as a guide for current and future planning. It addresses both the behavioral and property protection aspects of violence prevention. The goal of safe school planning is to create and maintain a positive and welcoming school climate, free
Next 10 →
Results 1 - 10 of 915
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University