Didn't find any results in this catalog!
But we have some results in other catalogs.Filters
total: 2965
-
Catalog
- Publications 1731 available results
- Journals 128 available results
- Conferences 26 available results
- People 269 available results
- Projects 8 available results
- Laboratories 1 available results
- Research Teams 1 available results
- e-Learning Courses 304 available results
- Events 5 available results
- Open Research Data 492 available results
displaying 1000 best results Help
Search results for: secure it architectures
-
LECTURE NOTES IN COMPUTER SCIENCE
Journals -
Architectus
Journals -
Contemporary architecture within the context of architectural education
PublicationAnalysed in this article are the diploma projects of students of architecture in European countries. The aim was to examine how students approach an important issue related to sustainable development, i.e. the integration of newly designed architecture into the existing historical, cultural and natural context. The rational use and protection of the environment requires the skilful shaping of urbanised space. Many changes in the...
-
The relationship between architectural detail and light in contemporary architecture
PublicationThe paper deals with the influence of modern artificial and natural lighting technology on contemporary architecture, especially in relation to architectural detail. Advanced complex lighting systems have an increasing importance in contemporary design solutions. Light itself, and the effect of its actions, and characteristic parts of the sophisticated lighting systems, play an essential role as independent architectural elements,...
-
Securo
Journals -
The potential of computational methods for the categorization of architectural objects on the example of media architecture
PublicationThe paper presents an example of the categorization of architectural objects and assessment of the characteristics of urban space, based on the analysis of specific features of architectural objects and urban landscape. The conducted analysis refers to media architecture and is presented in the complex context of the development of media solutions. The field of influence of IT on architecture is also stressed, both on the architect’s...
-
The concept of smart and secure laboratory.
PublicationW chwili obecnej, w erze globalizacji istnieje niezbędna konieczność rozwoju struktur gwarantujących zapewnienie bezpieczeństwa dla zasadniczych wyzwań stawianych przed ludzkością. Stąd potrzeba ujęcia aspektu bezpieczeństwa w kategoriach globalnych. Instytucje akademickie dostosowują się w tym zakresie stosunkowo szybko i zaczynają wyznaczać nowe trendy oraz prowadzą współpracę z instytucjami pozaakademickimi. Tego typu kooperacja,...
-
Global defensive secure structures
PublicationLet S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...
-
Secure Italian domination in graphs
PublicationAn Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...
-
Secure key from bound entanglement
PublicationScharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.