Sciweavers

3638 search results - page 162 / 728
» Distribution chain security
Sort
View
JSW
2007
147views more  JSW 2007»
15 years 3 months ago
Towards Secure e-Learning Applications: a Multiagent Platform
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...
Carine G. Webber, Maria de Fátima Webber do...
134
Voted
DEBS
2007
ACM
15 years 8 months ago
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Publish/subscribe systems provide an efficient, event-based, wide-area distributed communications infrastructure. Large scale publish/subscribe systems are likely to employ compon...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
128
Voted
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 10 months ago
Monitoring High-Quality Wine Production using Wireless Sensor Networks
This work reports the experience on the design and deployment of a WSN-based system for monitoring the productive cycle of high-quality wine in a Sicilian winery. Besides providin...
Giuseppe Anastasi, Orazio Farruggia, Giuseppe Lo R...
GCC
2003
Springer
15 years 9 months ago
GHIRS: Integration of Hotel Management Systems by Web Services
Nowadays web services technology is widely used to integrate heterogeneous systems and develop new applications. In this paper, an application of integration of hotel management sy...
Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury
NIPS
2008
15 years 5 months ago
The Infinite Factorial Hidden Markov Model
We introduce a new probability distribution over a potentially infinite number of binary Markov chains which we call the Markov Indian buffet process. This process extends the IBP...
Jurgen Van Gael, Yee Whye Teh, Zoubin Ghahramani