Sciweavers

464 search results - page 93 / 93
» Identity Management for Self-Portrayal
Sort
View
JNW
2008
177views more  JNW 2008»
13 years 5 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
TASE
2008
IEEE
13 years 5 months ago
Lean Buffering in Serial Production Lines With Nonidentical Exponential Machines
Lean buffering is the smallest buffer capacity, which is necessary and sufficient to ensure the desired production rate of a manufacturing system. Literature offers methods for des...
Shu-Yin Chiang, Alexander Hu, Semyon M. Meerkov
TWC
2008
154views more  TWC 2008»
13 years 5 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
MANSCI
2007
92views more  MANSCI 2007»
13 years 5 months ago
The Strategic Perils of Delayed Differentiation
Postponement or delayed product differentiation has been identified as a key strategy to manage increasing demand uncertainty. The benefits of postponement arise out of the abil...
Krishnan S. Anand, Karan Girotra