An end-to-end assessment of extreme weather impacts on food security

被引:0
|
作者
Erik Chavez
Gordon Conway
Michael Ghil
Marc Sadler
机构
[1] Imperial College London,Finance Department
[2] Centre for Environmental Policy,Geosciences Department and Environmental Research and Teaching Institute
[3] Imperial College London,Department of Atmospheric and Oceanic Sciences and Institute of Geophysics and Planetary Physics
[4] Imperial College Business School,Agriculture and Environmental Services Department
[5] Ecole Normale Supérieure,undefined
[6] Paris,undefined
[7] University of California,undefined
[8] Los Angeles,undefined
[9] The World Bank,undefined
[10] Risk and Markets Practice,undefined
来源
Nature Climate Change | 2015年 / 5卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
A series of simple and communicable risk metrics for agriculture are developed by integrating information on the interacting systems of climate, crops and economy under different climate and adaptation scenarios.
引用
下载
收藏
页码:997 / 1001
页数:4
相关论文
共 50 条
  • [41] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [42] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [43] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [44] End-to-end Security for Sleepy Smart Object Networks
    Sethi, Mohit
    Arkko, Jari
    Keranen, Ari
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
  • [45] End-to-End Security Methods for UDT Data Transmissions
    Bernardo, Danilo Valeros
    Hoang, Doan B.
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393
  • [46] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    COMPUTER, 2018, 51 (04) : 20 - 27
  • [47] Information security on the logistical network: An end-to-end approach
    Beck, M
    Plank, JS
    Millar, J
    Atchley, S
    Soltesz, S
    Bassi, A
    Liu, HD
    SECOND IEEE INTERNATIONAL SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2004, : 31 - 37
  • [48] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [49] End-to-End Security: When Do We Have It?
    Menezes, Alfred
    Stebila, Douglas
    IEEE SECURITY & PRIVACY, 2021, 19 (04) : 60 - 64
  • [50] An end-to-end transport protocol for extreme wireless network environments
    Subramanian, Vijaynarayanan
    Kalyanaraman, Shivkumar
    Ramakrishnan, K. K.
    MILCOM 2006, VOLS 1-7, 2006, : 3000 - 3006