Academic literature on the topic 'Computer networks – Europe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Europe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks – Europe"

1

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chips; or the subject of the crime, such as ‘hacking’ or ‘cracking’. The involvement of computers may challenge traditional criminal concepts, such as fraud, as well as facilitating particular types of crime, such as child pornography. This article is concerned with the computer as the subject of the crime and with laws that have been established to specifically address activities that attack the integrity of computer and communications networks, such as the distribution of computer viruses. This article examines various initiatives to harmonise substantive criminal law to address the threat of computer integrity crimes, focusing specifically on a draft Council Framework Decision on ‘attacks against information systems’. Consideration is given to the impact the Decision may have when transposed into UK law, through an amendment of existing legislation, the Computer Misuse Act 1990.
APA, Harvard, Vancouver, ISO, and other styles
2

Everett, Cath. "Lancope networks into Europe." Infosecurity Today 3, no. 1 (January 2006): 42–44. http://dx.doi.org/10.1016/s1742-6847(06)70367-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malighetti, Paolo, Gianmaria Martini, Renato Redondi, and Davide Scotti. "Integrators’ Air Transport Networks in Europe." Networks and Spatial Economics 19, no. 2 (February 15, 2018): 557–81. http://dx.doi.org/10.1007/s11067-018-9390-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

MAIXÉ-ALTÉS, J. CARLES. "The Digitalization of Banking: A New Perspective from the European Savings Banks Industry before the Internet." Enterprise & Society 20, no. 1 (September 4, 2018): 159–98. http://dx.doi.org/10.1017/eso.2018.18.

Full text
Abstract:
This work is a contribution to the study of the adoption and use of computers in the savings bank industry in western Europe before the arrival of the Internet. It documents the presence of a pan-European network of IT users and analyzes the role of their industry associations in the processes of adopting and disseminating technology. It describes and analyzes their situation as late technology users, indicating certain specific and original patterns in the adoption of computers. Special attention is given to the implementation of shared computer centers throughout Europe and the results in the area of online accounting systems and teleprocessing systems as steps before the development of savings bank electronic funds transfer networks. It documents that in the savings banks industry, a reciprocal influence between technology and its uses was in play over long period of time and throughout the technological changes.
APA, Harvard, Vancouver, ISO, and other styles
5

Kruit, Dirk, and Paul A. Cooper. "SHINE: Strategic health informatics networks for Europe." Computer Methods and Programs in Biomedicine 45, no. 1-2 (October 1994): 155–58. http://dx.doi.org/10.1016/0169-2607(94)90039-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cherkaoui, Soumaya. "Research Landscape – 6G Networks Research in Europe." IEEE Network 35, no. 6 (November 2021): 4–6. http://dx.doi.org/10.1109/mnet.2021.9687530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chadwick, Andrew. "Applications of neural networks for industry in Europe." Neurocomputing 1, no. 1 (January 1989): 34. http://dx.doi.org/10.1016/s0925-2312(89)80016-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gródek-Szostak, Zofia, Marcin Suder, Rafał Kusa, Anna Szeląg-Sikora, Joanna Duda, and Marcin Niemiec. "Renewable Energy Promotion Instruments Used by Innovation Brokers in a Technology Transfer Network. Case Study of the Enterprise Europe Network." Energies 13, no. 21 (November 3, 2020): 5752. http://dx.doi.org/10.3390/en13215752.

Full text
Abstract:
Stable and sustainable economic development—including that of renewable energy resources (RES)—requires institutional support of an environment that would enable market operations, and support them in case they are ineffective. Innovation brokers, including structured technology transfer networks, play a key role in promoting, disseminating, and liaising between the parties in the RES sector. The aim of the paper is to present the structure of events used to promote RES in Europe by the Enterprise Europe Network in the years 2017–2018; to verify whether the type of promotion instrument used is significantly related to the location of the events organized; to research whether the selection of the supporting partner is determined by the organized event’s geographical location. The analysis is carried out by means of an empirical study of the network of innovation brokers, i.e., the Enterprise Europe Network. Additionally, the available data are analyzed in terms of the type of the partner supporting individual events. It has been shown that there is a significant variation in the structure of the types of events for individual regions of Europe. This could mean that the organizers’ decisions as to the type of events organized in particular regions of Europe are deliberate and in some way adjusted to the region in which they take place.
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Haosen, and Markus H. Schafer. "WHEN CLOSE TIES LIVE FAR AWAY: PATTERNS AND PREDICTORS OF GEOGRAPHIC NETWORK RANGE AMONG OLDER EUROPEANS." Innovation in Aging 3, Supplement_1 (November 2019): S755. http://dx.doi.org/10.1093/geroni/igz038.2771.

Full text
Abstract:
Abstract Using the Survey of Health, Ageing and Retirement in Europe (SHARE, Wave 6 in 2015), this paper examines the structure of older adults’ core discussion networks in terms of their geographical outreach. We also examine how far respondents live from their friends, and how such a connection is conditioned by the presence of a proximate child in the network. Findings suggest that older adults in Northern Europe are more likely to have a confidant at mid- and long-range (5-25km and >25km, respectively) than seniors in Central Europe, while their counterparts from Eastern and Southern Europe are less likely to identify a discussant out of their 5km radius. This pattern persists when focusing only on non-kin members of one’s network. However, having a nearby child confidant does not affect the probability of being connected to friends at variant distances in North Europe, while it does predict a lower likelihood of having close-by (0-5km) and long-distance (>25km) friends in Eastern and Southern regions. Other significant predictors of one’s geographical network reach, such as education, financial standing, cognitive ability, computer skills, and car ownership are also discussed and compared across European regions.
APA, Harvard, Vancouver, ISO, and other styles
10

Dearlove, Marion J. "The adoption of electronic trading in Western Europe." Computer Communications 17, no. 5 (May 1994): 369–74. http://dx.doi.org/10.1016/0140-3664(94)90051-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer networks – Europe"

1

Schmitz, Ralf. "Advanced transport protocols for wireless and mobile ad hoc networks dissertation in co-operation between Faculty of Computer Science IV, University of Mannheim, Germany and NEC Europe Ltd., Network Laboratories Heidelberg, Germany /." [S.l. : s.n.], 2006. http://madoc.bib.uni-mannheim.de/madoc/volltexte/2007/1410/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Guangguang. "Rainfall field modelling for European satellite networks." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/rainfall-field-modelling-for-european-satellite-networks(5c9b2bc0-b2df-4787-ac35-4852c2577237).html.

Full text
Abstract:
This thesis provides a new space-time statistical rain model and a novel space-time interpolation approach for planning and dimensioning wide area high frequency satellite communication networks. Key characteristics of rainfall rate fields are modelled. These include detailed description of: (i) the first order statistical distribution, (ii) the spatial and temporal correlation functions of rainfall rate and, and (iii) the probability of rain/no-rain. With a focus on their relevance to satellite and terrestrial microwave network design, the key contribution of this study is the assessment of the impact of varying spatial and temporal integration lengths on these quantities. The issue of how these key characteristics of rainfall rate field change with different area sizes are analysed in this thesis and it is novel. A simple but accurate interpolation approach of the key characteristic parameters is presented in this thesis. The novelty of the proposed technique is that it does not rely directly on the radar/raingauge derived rainfall rate data like traditional models do but rather on fitted coefficients and computed rain characteristics. This thesis proposes rain parameter contour maps and databases covering the whole of Western Europe from which users can conveniently obtain the key rain characteristic parameters at any location within the studied area. More speculatively, the space-time interpolation approach can extrapolate to rain parameters at space-time resolutions shorter than those in the NIMROD databases. The results have been validated by comparing them with those from ITU Rec model and measurements by NIMROD rain radar. In addition, a Graphical User Interface (GUI) software has been provided that allows users to interact with the proposed model. The user can easily obtain the information of the key rain characteristics at different space-time scales by simply inputting the longitude, latitude, space resolution and time resolution of the location of interest. The detailed results are then automatically calculated and displayed by the software significantly facilitating rain rate study.
APA, Harvard, Vancouver, ISO, and other styles
3

Tobal, Marc. "Network Sharing Strategies and Regulations in Europe and the Middle East." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177158.

Full text
Abstract:
The thesis work intends to tackle network sharing practices in Eu- rope and in the Middle East and to convey the regulatory structure in both continents. To do this, a number of countries have been chosen such as to show the dierent types of sharing and how the agreements dier depending on the depth of them. To do this, I look at the market conditions and the incentive for a certain depth of sharing, and at the same time I investigate to what extent sharing is possible from the regulatory authority. Equal attention is given both on Europe and the Middle East in order to draw fair comparisons. Most results given on the Middle East have been evident due to the interviews conducted. The regulatory structure in both continents is given in order to un- derstand how properly separated regulations are and in what way the regulatory role diers. In the last part, I investigate whether or not a higher extent of sharing would suit the Arabic countries and if it is attractive by the market players. The results show that the operators in Europe are sharing all kind of equipment and a shift towards a full sharing scenario is evident, whereas the sharing agreements in the Middle East are limited to pas- sive sharing or no sharing at all. In terms of what is allowed and what's not, the regulators in EU have dierent opinions on how much is allowed whether the regulators in the Middle East are fairly neutral towards it, i.e they do not actively support it nor do they reject it. In terms of regulations, the regulator role is to apply the laws of the EU Commission in all the members states of EU, whereas the role is to follow the policy of the Ministry in the Arabic countries. This has not always allowed for a proper separation of the Ministry and acting regulator in the Middle East, and due to that some regulators have not been able to conduct their responsibilities freely. When the sepa- ration has been successful, the regulator has been seen to give a much clearer stance on network sharing, typically in the form of including requirements with licenses that facilitates sharing, such as in Oman and Jordan. The need to share more infrastructures have been evident through a initiative taken by the biggest operators in the MENA re- gion. At the same time, I have concluded that none of the countries I have studied has the advantage of adopting a higher extent of shar- ing today because competition is limited and because passive sharing needs to become fully common and co-opetition developed, before it is to happen. Meanwhile, to get two competitors to go beyond passive will most likely not happen today if they are not compelled by the regulator.
APA, Harvard, Vancouver, ISO, and other styles
4

Haefke, Christian. "The European unemployment puzzle /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2000. http://wwwlib.umi.com/cr/ucsd/fullcit?p9975888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jung, Francis. "La cartographie assistee par ordinateur du reseau de transport d'electricite de france." Paris 6, 1987. http://www.theses.fr/1987PA066108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lububu, Steven. "Perception of employees concerning information security policy compliance : case studies of a European and South African university." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2802.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018.
This study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem is that information leakages have serious consequences for institutions, especially those that rely on information for its sustainability, functionality and competitiveness. As such, institutions ensure that information about their processes, activities and services are secured, which they do through enforcement and compliance of policies. The aim of this study is to explore the extent of non-compliance with information security policy in an institution. The study followed an interpretive, qualitative case study approach to understand the meaningful characteristics of the actual situations of security breaches in institutions. Qualitative data was collected from two universities, using semi-structured interviews, with 17 participants. Two departments were selected: Human Resources and the Administrative office. These two departments were selected based on the following criteria: they both play key roles within an institution, they maintain and improve the university’s policies, and both departments manage and keep confidential university information (Human Resources transects and keeps employees’ information, whilst the Administrative office manages students’ records). This study used structuration theory as a lens to view and interpret the data. The qualitative content analysis was used to analyse documentation, such as brochures and information obtained from the websites of the case study’s universities. The documentation was then further used to support the data from the interviews. The findings revealed some factors that influence non-compliance with regards to information security policy, such as a lack of leadership skills, favouritism, fraud, corruption, insufficiency of infrastructure, lack of security education and miscommunication. In the context of this study, these factors have severe consequences on an institution, such as the loss of the institution’s credibility or the institution’s closure. Recommendations for further study are also made available.
APA, Harvard, Vancouver, ISO, and other styles
7

Socrates, Vimig. "Neuro-Integrative Connectivity: A Scientific Workflow-Based Neuroinformatics Platform For Brain Network Connectivity Studies Using EEG Data." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1561655750151063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gaskell, Gary Ian. "Integrating smart cards into Kerberos." Thesis, Queensland University of Technology, 1999. https://eprints.qut.edu.au/36848/1/36848_Gaskell_2000.pdf.

Full text
Abstract:
The aim of this thesis is to identify alternatives for the integration of smart cards into a classic Kerberos system. Some researchers have proposed specific solutions. Each proposal appeared to be limited and, hence, there was a need to identify what other approaches were available. It was identified that smart cards can be added to each of the interfaces of Kerberos (user to authentication server, user to ticket granting server and user to application server). It appears most appropriate to use smart cards in the user to Authentication Server interface. The user's workstation is trusted with application data and so it will be usually appropriate for the application session keys to also be trusted to the user's workstation. The smart card can be integrated into the user to Authentication Server mes­saging implementation so that the user's authentication information is never ex­posed to the workstation. Six options have been identified for the integration in this interface. Some of the concepts developed were prototyped in order to identify the prac­ticality of the suggestions. An early beta release of Kerberos from Massachusetts Institute of Technology was used as the base for prototyping. It was found that complex protocols, such as Zero Knowledge Protocols, can­not be implemented on today's smart cards without special customisations by the smart card vendors. However, protocols that only required the use of com­mon cryptographic functions such as DES (Data Encryption Standard) and RSA (Rivest, Shamir and Adleman) can be implemented.
APA, Harvard, Vancouver, ISO, and other styles
9

Ashley, Paul. "Security technologies for intranet computing." Thesis, Queensland University of Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jaume, Bennasar Andrés. "Las nuevas tecnologías en la administración de justicia. La validez y eficacia del documento electrónico en sede procesal." Doctoral thesis, Universitat de les Illes Balears, 2009. http://hdl.handle.net/10803/9415.

Full text
Abstract:
La tesis se encarga de analizar, por un lado, la integración y el desarrollo de las nuevas tecnologías en la Administración de Justicia; y, por otro, los parámetros que constituyen la validez y eficacia del documento electrónico.
La primera cuestión se centra en la configuración de los Sistemas de Información de la Oficina Judicial y del Ministerio Fiscal, así como de la informatización de los Registros Civiles, donde el art. 230 LOPJ es la pieza clave. Se estudian sus programas, aplicaciones, la videoconferencia, los ficheros judiciales y las redes de telecomunicaciones que poseen la cobertura de la firma electrónica reconocida, donde cobran gran relevancia los convenios de colaboración tecnológica. La digitalización de las vistas quizá sea una de las cuestiones con más trascendencia, teniendo en cuenta que el juicio es el acto que culmina el proceso. Aunque no todos los proyectos adoptados en el ámbito de la e.justicia se han desarrollado de forma integral, ni han llegado a la totalidad de los órganos judiciales. El objetivo final es lograr una Justicia más ágil y de calidad, a lo cual aspira el Plan Estratégico de Modernización de la Justicia 2009-2012 aprobado recientemente.
En referencia a la segunda perspectiva, no cabe duda que el Ordenamiento jurídico y los tribunales, en el ámbito de la justicia material, otorgan plena validez y eficacia al documento electrónico. Nuestra línea de investigación se justifica porque cada vez son más los procesos que incorporan soportes electrónicos de todo tipo, ya sea al plantearse la acción o posteriormente como medio de prueba (art. 299.2 LEC). Entre otros temas examinamos el documento informático, la problemática que rodea al fax, los sistemas de videograbación y el contrato electrónico.
La tesi s'encarrega d'analitzar, per una part, la integració i el desenvolupament de les noves tecnologies dins l´Administració de Justícia; i, per l'altra, els paràmetres que constitueixen la validesa i l'eficàcia del document electrònic.
La primera qüestió es centra en la configuració dels Sistemes d´Informació de l´Oficina Judicial i del Ministeri Fiscal, així com de la informatització dels Registres Civils, on l'art. 230 LOPJ es la peça clau. S'estudien els seus programes, aplicacions, la videoconferència, el fitxers judicials i les xarxes de telecomunicacions que tenen la cobertura de la firma electrònica reconeguda, on cobren gran rellevància els convenis de col·laboració tecnològica. La digitalització de les vistes tal vegada sigui una de les qüestions amb més transcendència, tenint amb compte que el judici es l'acte que culmina el procés. Però no tots el projectes adoptats en l'àmbit de la e.justicia s'han desenvolupat d'una manera integral ni han arribat a la totalitat dels òrgans judicials. L'objectiu final es assolir una Justícia més àgil i de qualitat, al que aspira el Pla Estratègic de Modernització de la Justícia 2009-2012 aprovat recentment.
En referència a la segona perspectiva, no hi ha dubte que l´Ordenament jurídic i els tribunals, en l'àmbit de la justícia material, donen plena validesa i eficàcia al document electrònic. La nostra línia d'investigació es justifica perquè cada vegada son més el processos que incorporen suports electrònics de tot tipus, ja sigui quant es planteja l'acció o posteriorment como a medi de prova (art. 299.2 LEC). Entre altres temes examinem el document informàtic, la problemàtica que envolta al fax, els sistemes de videogravació i el contracte electrònic.
The thesis seeks to analyse, on the one hand, the integration and development of the new technologies in the Administration of Justice; and, on the other, the parameters which constitute the validity and efficiency of the electronic document.
The first question centres on the configuration of the Information Systems of the Judicial Office and the Public Prosecutor, as well as the computerisation of the Civil Registers, where the art. 230 LOPJ it's the part key. Their programmes, applications, the Video Conferencing, the judicial registers and the telecommunication networks which are covered by the recognised electronic signatures, are studied, where the agreements on technological collaboration gain great relevance. The digitalisation of evidence might perhaps be one of the questions with most consequence, bearing in mind that the judgment is the act by which the process is culminated. Although not all the projects adopted within the compass of e.justice have developed completely nor have reached all the judicial organs. The final objective is to achieve an agile, quality Justice, to which the recently approved Strategic Plan for the Modernisation of Justice aspires.
With reference to the second perspective, there is no doubt that the juridical Ordinance and the tribunals within the compass of material justice grant full validity and efficacy to the electronic document. Our line of investigation is justified because there are more and more processes which are sustained by electronic supports of all kinds, whether it be at the establishment of the action or later, as a proof of it (art. 299.2 LEC). Amongst other things, we examine the computerised document, the problems which surround the fax, the systems for video recording and the electronic contract.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer networks – Europe"

1

Ewers, Andy. Libraries, networks and Europe: A European networking study. Edited by Ewers Andy, Dempsey Lorcan, Kessler Jack, Smith Neil, and British Library. Research and Development Department. [London]: British Library Research and Development Department, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nabil, Abdennadher, Kordon Fabrice, and Ada-Europe (Organization), eds. Reliable software technologies: Ada-Europe 2007 : 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007 : proceedings. Berlin: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

(Firm), INPUT, ed. The Network service market: Western Europe, 1990-1995. London: INPUT, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Romanovsky, Alexander. Reliable Software Technologies - Ada-Europe 2011: 16th Ada-Europe International Conference on Reliable Software Technologies, Edinburgh, UK, June 20-24, 2011. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Indira, Carr, ed. Computer crime. Aldershot, Hants, England: Ashgate, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hans-Peter, Geh, Walckiers Marc, and European Foundation for Library Cooperation., eds. Library networking in Europe: European conference, 12-14 October 1994, Brussels : proceedings. London: TFPL Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1946-, Strohmeier Alfred, ed. Reliable software technologies, Ada-Europe '96: 1996 Ada-Europe International Conference on Reliable Software Technologies, Montreux, Switzerland, June 10-14, 1996 : proceedings. Berlin: Springer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ada-Europe International Conference on Reliable Software Technologies (15th 2010 Valencia, Spain). Reliable software technologies, Ada-Europe 2010: 15th Ada-Europe International Conference on Reliabel Software Technologies, Valencia, Spain, June 14-18, 2010 ; proceedings. Berlin: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International, Conference and Exhibition on High Performance Computing and Networking (1996 Brussels Belgium). High-performance computing and networking: International Conference and Exhibition, HPCN EUROPE 1996, Brussels, Belgium, April 15-19, 1996 : proceedings. Berlin: Springer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Miguel, Pinho Luís, and SpringerLink (Online service), eds. Reliable Software Technologies – Ada-Europe 2012: 17th Ada-Europe International Conference on Reliable Software Technologies, Stockholm, Sweden, June 11-15, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer networks – Europe"

1

Burchinsky, Sergei G., and Yuri K. Duplenko. "Computer-Aided Cluster Analysis of Citation Networks as a Tool of Research Policy in Biomedicine." In Medical Informatics Europe 1991, 919–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-93503-9_164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bailey, Michael, Drew Johnston, Theresa Kuchler, Dominic Russel, Bogdan State, and Johannes Stroebel. "The Determinants of Social Connectedness in Europe." In Lecture Notes in Computer Science, 1–14. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60975-7_1.

Full text
Abstract:
Abstract We use de-identified and aggregated data from Facebook to study the structure of social networks across European regions. Social connectedness declines strongly in geographic distance and at country borders. Historical borders and unions—such as the Austro-Hungarian Empire, Czechoslovakia, and East/West Germany—shape present-day social connectedness over and above today’s political boundaries and other controls. All else equal, social connectedness is stronger between regions with residents of similar ages and education levels, as well as between regions that share a language and religion. In contrast, region-pairs with dissimilar incomes tend to be more connected, likely due to increased migration from poorer to richer regions.
APA, Harvard, Vancouver, ISO, and other styles
3

Jennett, Penny, I. J. T. Parboosingh, William R. Maes, and Jocelyn M. Lockyer. "Medical Rural/Academic Computer And Communication Networks: Their Potential to Assist with the Health of the Community i.e., Their Health Added Value." In Medical Informatics Europe ’90, 391–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-642-51659-7_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kokkinen, Topias, Heikki Kokkinen, and Seppo Yrjölä. "Location Dependent Spectrum Valuation of Private LTE and 5G Networks in Europe." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 306–19. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25748-4_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gajdošík, Tomáš. "Contribution of Network Approach to Tourism Destination Governance." In Information and Communication Technologies in Tourism 2023, 179–91. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25752-0_21.

Full text
Abstract:
AbstractA tourism destination is a prototypical complex phenomenon and an ideal object of study of network science. Thanks to recent advances in computer science, this approach is capable of providing the baseline needed to design and govern tourism destinations in a dynamic environment. Although there have been some major contributions to this phenomenon, their scarcity has brought a rather fragmented contribution to tourism destination governance. Therefore, the aim of this paper is to conceptualise the contribution of network approach to tourism destination governance. Based on 10 real and virtual networks of mature tourism destinations in a Central Europe, the article provides areas where the network approach can help the tourism destination governance. Furthermore, it suggests managerial implications from the application of the network approach in the practice of governing a tourism destination.
APA, Harvard, Vancouver, ISO, and other styles
6

Radoniewicz, Filip. "International Regulations of Cybersecurity." In Cybersecurity in Poland, 53–71. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_5.

Full text
Abstract:
AbstractThere is no doubt that, due to the global nature of modern ICT networks, international cooperation plays a key role in ensuring cybersecurity, including in the fight against cybercrime.This chapter describes initiatives taken within international organizations to ensure cybersecurity and the prevention of cybercrime. The presentation will start with the initiatives of the OECD and the Council of Europe. This is due not only to some kind of “Eurocentrism” but above all to the fact that these two organisations were the first to address cybersecurity and cybercrime issues. In addition, the Council of Europe Convention 185 on CyberCrime of November the 23rd, 2001, an international agreement concluded in the Council of Europe, is a milestone in the prevention of computer crime, remaining the only binding act of international law to combat it. Its importance is best demonstrated by the constantly growing number of signatories (and countries that model without signatures after the provisions, e.g. Pakistan) and the fact that international organisations, or recommend that their members accept (UN, G7/G8, European Union) or “copy” provisions, creating their own model legal acts (e.g. Commonwealth).
APA, Harvard, Vancouver, ISO, and other styles
7

Rehn, S. "Computers and Creativity — A Case Study." In Creativity and Innovation: towards a European Network, 203–5. Dordrecht: Springer Netherlands, 1988. http://dx.doi.org/10.1007/978-94-009-2827-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Geschka, H. "Development of Morphological Solutions Using a Personal Computer Program." In Creativity and Innovation: towards a European Network, 197–200. Dordrecht: Springer Netherlands, 1988. http://dx.doi.org/10.1007/978-94-009-2827-5_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dekker, D. "The Role of Computers, Simulations & Games." In Creativity and Innovation: towards a European Network, 189–90. Dordrecht: Springer Netherlands, 1988. http://dx.doi.org/10.1007/978-94-009-2827-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Miesenberger, Klaus, Eric Velleman, David Crombie, Helen Petrie, Jenny S. Darzentas, and Carlos A. Velasco. "The eAccess+ Network: Enhancing the Take-Up of eAccessibility in Europe." In Lecture Notes in Computer Science, 325–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31522-0_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks – Europe"

1

Koerner, Marc. "The OFELIA TUB-island an Europe-wide connected OpenFlow testbed." In 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/lcn.2013.6761259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barmparitsas, Nikolaos, Alice Baronchelli, Sotirios Karellas, Platon Pallis, and Sotirios Thanopoulos. "Retradeables: the first online marketplace for used F-gases in Europe." In 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2022. http://dx.doi.org/10.1109/seeda-cecnsm57760.2022.9932956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Burkus, Viktória, Attila Kárpáti, and László Szécsi. "Particle-Based Fluid Surface Rendering with Neural Networks." In WSCG'2021 - 29. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2021. Západočeská univerzita v Plzni, 2021. http://dx.doi.org/10.24132/csrn.2021.3101.26.

Full text
Abstract:
Surface reconstruction for particle-based fluid simulation is a computational challenge on par with the simula- tion itself. In real-time applications, splatting-style rendering approaches based on forward rendering of particle impostors are prevalent, but they suffer from noticeable artifacts. In this paper, we present a technique that combines forward rendering simulated features with deep-learning image manipulation to improve the rendering quality of splatting-style approaches to be perceptually similar to ray tracing solutions, circumventing the cost, complexity, and limitations of exact fluid surface rendering by replacing it with the flat cost of a neural network pass. Our solution is based on the idea of training generative deep neural networks with image pairs consisting of cheap particle impostor renders and ground truth high quality ray-traced images.
APA, Harvard, Vancouver, ISO, and other styles
4

Vangelista, Lorenzo, Luca Dell'Anna, and Ivano Calabrese. "On the coexistence of LoRaWAN and legacy short range devices in unlicensed bands in Europe." In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2019. http://dx.doi.org/10.23919/softcom.2019.8903757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ganganna Ravindra, Darshan, Dinges Laslo, Ayoub Al-Hamadi, and Vasili Baranau. "Fast and Precise Binary Instance Segmentation of 2D Objects for Automotive Applications." In WSCG'2022 - 30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2022. Západočeská univerzita, 2022. http://dx.doi.org/10.24132/csrn.3201.38.

Full text
Abstract:
n this paper, we focus on improving binary 2D instance segmentation to assist humans in labeling ground truth datasets with polygons. Humans labeler just have to draw boxes around objects, and polygons are generated automatically. To be useful, our system has to run on CPUs in real-time. The most usual approach for binary instance segmentation involves encoder-decoder networks. This report evaluates state-of-the-art encoder-decoder networks and proposes a method for improving instance segmentation quality using these networks. Alongside network architecture improvements, our proposed method relies upon providing extra information to the network input, so-called “extreme points”, i.e. the outermost points on the object silhouette. The user can label them instead of a bounding box almost as quickly. The bounding box can be deduced from the extreme points as well. This method produces better IoU compared to other state-of-the-art encoder-decoder networks and also runs fast enough when it is deployed on a CPU.
APA, Harvard, Vancouver, ISO, and other styles
6

Mezzini, Mauro. "Empirical study on label smoothing in neural networks." In 26. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2017. Západočeská univerzita, 2018. http://dx.doi.org/10.24132/csrn.2018.2802.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hemani, Mayur, Abhishek Sinha, and Balaji Krishnamurthy. "Stylized Sketch Generation using Convolutional Networks." In WSCG'2019 - 27. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2019. Západočeská univerzita, 2019. http://dx.doi.org/10.24132/csrn.2019.2901.1.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mpantola, Ekaterina, John Vardakas, and Malamati Louta. "Performance evaluation of Cloud Radio Access Networks by jointly considering communicational and computational network resources." In 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2021. http://dx.doi.org/10.1109/seeda-cecnsm53056.2021.9566269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tewari, Aditya, Bertram Taetz, and Frédéric Grandidier. "Combination of Temporal Neural Networks for Improved Hand Gesture Classification." In 26. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2017. Západočeská univerzita, 2018. http://dx.doi.org/10.24132/csrn.2018.2802.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Badis, Chafaa, Welton Souza, Mohammad Abadullah Yasir, and Perminder Sabharwal. "Machine Learning/Artificial Intelligence Driven Computer Vision for Cuttings Analysis Under Drilling and Completions." In SPE Eastern Europe Subsurface Conference. SPE, 2021. http://dx.doi.org/10.2118/208509-ms.

Full text
Abstract:
Abstract The shape and size of formation cuttings passing through a shaker screen can provide valuable insights about any potential downhole problems. Large size cuttings or carvings may indicate the presence of an abnormal pressure zone and hole size may be enlarged which may lead to NPT events (stuck pipe, loss circulation, etc.), asset loss or HSE incidents. We proposed a new method of real-time automated analysis of cuttings in the shale shaker enabling faster reaction to mitigate risks associated with drilling operations. The solution uses a camera on the shaker screen, capturing the cuttings images and applying computer vision and convolutional neural networks algorithms to identify and classify individual cuttings shape, size and type combined with wireline data to raise alarms on specific conditions and prescribe actions to mitigate the problem. The solution showed a remarkably high confidence in identifying the cutting types and size and in detecting potential problems at their early stage enabling the drilling engineers to take the corrective actions at the onset of an event.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography