The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the progress of wearable sensor technologies, more wearable health sensors have been made available on the market, which enables not only people to monitor their health and lifestyle in a continuous way but also doctors to utilise them to make better diagnoses. Continuous measurement from a variety of wearable sensors implies that a huge amount of data needs to be collected, stored, processed...
This paper analyzed the basic characteristics of online trading as a form of virtual enterprise under network environment, and the shell model was proposed, in which management behavior problems about online shop was discussed. Some developmental strategies about online shop were given at the end, which as a method for the management problems of virtual enterprise.
With the limitations of funds and strength, most of small and medium enterprises (SMEs) often choose the model of logistics outsourcing to reduce costs, and improve logistics efficiency. However, while the logistics cost of the production or commercial enterprises keeps a higher level, the third-party logistics enterprises take a fewer profits or even losses. This paper analyses the contradictory...
In bioinformatics experiments related to in silico modelling, huge sets of data at different physical scales, and frequently from different scientific laboratories, are created. Likewise, the data processing algorithms being used have been developed by researchers in different institutions; some are newly created, some have been in use for a long time. It remains a huge challenge to share and manage...
The growing proliferation of malware is raising doubts about the Internet's future. Security measures primarily target inbound traffic, but service providers have no incentive to stop attacks and spam at the source. A proposed certification scheme motivates providers to control outgoing traffic, efficiently increasing overall security while preserving the Internet's open, decentralized structure
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.