Search results for: secure IT architectures - Bridge of Knowledge

Search

Search results for: secure IT architectures
Przykład wyników znalezionych w innych katalogach

Search results for: secure IT architectures

  • LECTURE NOTES IN COMPUTER SCIENCE

    Journals

    ISSN: 0302-9743

  • Contemporary architecture within the context of architectural education

    Analysed in this article are the diploma projects of students of architecture in European countries. The aim was to examine how students approach an important issue related to sustainable development, i.e. the integration of newly designed architecture into the existing historical, cultural and natural context. The rational use and protection of the environment requires the skilful shaping of urbanised space. Many changes in the...

    Full text available to download

  • Architectus

    Journals

    ISSN: 1429-7507 , eISSN: 2084-5227

  • The relationship between architectural detail and light in contemporary architecture

    Publication

    The paper deals with the influence of modern artificial and natural lighting technology on contemporary architecture, especially in relation to architectural detail. Advanced complex lighting systems have an increasing importance in contemporary design solutions. Light itself, and the effect of its actions, and characteristic parts of the sophisticated lighting systems, play an essential role as independent architectural elements,...

    Full text to download in external service

  • The potential of computational methods for the categorization of architectural objects on the example of media architecture

    Publication

    The paper presents an example of the categorization of architectural objects and assessment of the characteristics of urban space, based on the analysis of specific features of architectural objects and urban landscape. The conducted analysis refers to media architecture and is presented in the complex context of the development of media solutions. The field of influence of IT on architecture is also stressed, both on the architect’s...

    Full text available to download

  • Securo

    Journals

    ISSN: 2353-6330

  • Secure Italian domination in graphs

    Publication

    - JOURNAL OF COMBINATORIAL OPTIMIZATION - Year 2021

    An Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...

    Full text available to download

  • The concept of smart and secure laboratory.

    Publication

    - Year 2004

    W chwili obecnej, w erze globalizacji istnieje niezbędna konieczność rozwoju struktur gwarantujących zapewnienie bezpieczeństwa dla zasadniczych wyzwań stawianych przed ludzkością. Stąd potrzeba ujęcia aspektu bezpieczeństwa w kategoriach globalnych. Instytucje akademickie dostosowują się w tym zakresie stosunkowo szybko i zaczynają wyznaczać nowe trendy oraz prowadzą współpracę z instytucjami pozaakademickimi. Tego typu kooperacja,...

  • Global defensive secure structures

    Publication

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Full text to download in external service

  • Approaching Secure Industrial Control Systems

    Publication

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Full text available to download