Sciweavers

3638 search results - page 196 / 728
» Distribution chain security
Sort
View
IFIP
2007
Springer
15 years 10 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller
CW
2005
IEEE
15 years 10 months ago
Web-Based Configure-to-Order Platform for Collaborative Development of Customized Products
To support the collaborative development of custom products in current distributed manufacturing, this paper develops a Web-based configure-to-order platform. The proposed platfor...
Roger Jianxin Jiao, Martin G. Helander, Lianfeng Z...
COLCOM
2009
IEEE
15 years 9 months ago
Learning communities supported by autonomic recommendation mechanism
- Peer-to-peer (P2P) offers good solutions for many applications such as large data sharing and collaboration. Thus, it appears as a powerful paradigm to develop scalable distribut...
Stainam N. Brandao, Ricardo T. Silva, Jano M. Souz...
SODA
1998
ACM
159views Algorithms» more  SODA 1998»
15 years 5 months ago
Average-Case Analyses of First Fit and Random Fit Bin Packing
We prove that the First Fit bin packing algorithm is stable under the input distribution U{k - 2, k} for all k 3, settling an open question from the recent survey by Coffman, Gar...
Susanne Albers, Michael Mitzenmacher
SPAA
2010
ACM
15 years 9 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...