Sciweavers

3584 search results - page 633 / 717
» Design considerations for a network of information
Sort
View
WSC
2001
14 years 11 months ago
Distributed simulation with incorporated APS procedures for high-fidelity supply chain optimization
Tactical and operational planning for manufacturing enterprises are more important today than ever before as their supply chains span the globe. Two state-of-the-art technologies ...
Peter Lendermann, Boon-Ping Gan, Leon F. McGinnis
CCS
2010
ACM
14 years 10 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ETT
2006
154views Education» more  ETT 2006»
14 years 10 months ago
Digital switchover in UHF: the ATHENA concept for broadband access
This paper presents a concept adopted by ATHENA IST-507312 project for the proper adoption of digital switchover (DSO), i.e. the transition form analogue to digital broadcasting in...
Evangelos Pallis, Charalambos Mantakas, George Mas...
JIIS
2006
113views more  JIIS 2006»
14 years 10 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan