Sciweavers

260 search results - page 52 / 52
» Operational Information Systems: An Example from the Airline...
Sort
View
SRDS
2003
IEEE
13 years 10 months ago
Modeling and Detecting Failures in Next-generation Distributed Multimedia Applications
In this paper we investigate dependability issues of nextgeneration distributed multimedia applications. Examples of such applications are autonomous vehicle control, telemedicine...
Domenico Cotroneo, Cristiano di Flora, Generoso Pa...
MANSCI
2007
102views more  MANSCI 2007»
13 years 4 months ago
Implications of Renegotiation for Optimal Contract Flexibility and Investment
After entering into supply contracts, firms often later renegotiate the terms of those contracts. For example, firms that obtain market demand information after signing supply c...
Erica L. Plambeck, Terry A. Taylor
ACSAC
2007
IEEE
13 years 11 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
PERVASIVE
2010
Springer
13 years 6 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
JUCS
2008
156views more  JUCS 2008»
13 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng