Sciweavers

2978 search results - page 226 / 596
» Operations Research
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 11 months ago
Combining RFID Technology and Business Intelligence for Supply Chain Optimization' Scenarios for Retail Logistics
“Radio Frequency Identification” (RFID) and the related EPC standards promise to enable an automatic collection of supply chain data for optimization purposes. While extensive...
Henning Baars, Hans-Georg Kemper, Heiner Lasi, Mar...
AI
2008
Springer
15 years 5 months ago
Reachability analysis of uncertain systems using bounded-parameter Markov decision processes
Verification of reachability properties for probabilistic systems is usually based on variants of Markov processes. Current methods assume an exact model of the dynamic behavior a...
Di Wu, Xenofon D. Koutsoukos
DAMON
2007
Springer
15 years 11 months ago
The five-minute rule twenty years later, and how flash memory changes the rules
In 1987, Gray and Putzolo presented the five-minute rule, which was reviewed and renewed ten years later in 1997. With the advent of flash memory in the gap between traditional RA...
Goetz Graefe
152
Voted
IDMS
2001
Springer
145views Multimedia» more  IDMS 2001»
15 years 9 months ago
A Service Differentiation Scheme for the End-System
A number of research studies show that the operating system has a substantial influence on communication delay in distributed environments. Thus, in order to provide applications w...
Domenico Cotroneo, Massimo Ficco, Giorgio Ventre
ICC
2009
IEEE
155views Communications» more  ICC 2009»
15 years 2 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson