Sciweavers

1517 search results - page 199 / 304
» Time and Location Based Services with Access Control
Sort
View
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
15 years 4 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
WSC
2004
14 years 11 months ago
Supply Chain Management Tradeoffs Analysis
Supply chain management involves understanding complex interactions between many factors and using the understanding to achieve balance between conflicting objectives. Simulation ...
Sanjay Jain
IJOE
2011
118views more  IJOE 2011»
14 years 5 months ago
Three Online Neutron Beam Experiments Based on the iLab Shared Architecture
- Students at MIT have traditionally executed certain experiments in the containment building of the MIT nuclear reactor as part of courses in Nuclear Engineering and the third yea...
Kimberly DeLong, Judson V. Harward, Philip H. Bail...
TASE
2008
IEEE
14 years 10 months ago
Modeling and Supervisory Control of Railway Networks Using Petri Nets
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...
Alessandro Giua, Carla Seatzu