Sciweavers

3638 search results - page 28 / 728
» Distribution chain security
Sort
View
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
15 years 1 months ago
Input design using Markov chains for system identification
This paper studies the input design problem for system identification where time domain constraints have to be considered. A finite Markov chain is used to model the input of the s...
Chiara Brighenti, Bo Wahlberg, Cristian R. Rojas
EUROPKI
2007
Springer
15 years 4 months ago
Undeniable Mobile Billing Schemes
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system b...
Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
ANSS
2005
IEEE
15 years 3 months ago
Approximation of Discrete Phase-Type Distributions
The analysis of discrete stochastic models such as generally distributed stochastic Petri nets can be done using state space-based methods. The behavior of the model is described ...
Claudia Isensee, Graham Horton
GI
2007
Springer
15 years 4 months ago
Developing a Security Event Management System for Intermodal Transport
: Bremen, Federal State of Germany, is planning to set up a headquarter for GMES - Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics an...
Rainer Müller
UAI
2001
14 years 11 months ago
Markov Chain Monte Carlo using Tree-Based Priors on Model Structure
We present a general framework for defining priors on model structure and sampling from the posterior using the Metropolis-Hastings algorithm. The key ideas are that structure pri...
Nicos Angelopoulos, James Cussens