Sciweavers

2826 search results - page 68 / 566
» A resource-based analysis of IT sourcing
Sort
View
ICCCN
2008
IEEE
14 years 3 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
AAAI
2010
13 years 10 months ago
Decision-Theoretic Control of Crowd-Sourced Workflows
Crowd-sourcing is a recent framework in which human intelligence tasks are outsourced to a crowd of unknown people ("workers") as an open call (e.g., on Amazon's Me...
Peng Dai, Mausam, Daniel S. Weld
TIFS
2008
179views more  TIFS 2008»
13 years 8 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
IOR
2010
112views more  IOR 2010»
13 years 7 months ago
New Policies for the Stochastic Inventory Control Problem with Two Supply Sources
We study an inventory system under periodic review in the presence of two suppliers (or delivery modes). The emergency supplier has a shorter lead-time than the regular supplier, ...
Anshul Sheopuri, Ganesh Janakiraman, Sridhar Sesha...
CORR
2011
Springer
183views Education» more  CORR 2011»
13 years 3 months ago
Sparse Signal Recovery with Temporally Correlated Source Vectors Using Sparse Bayesian Learning
— We address the sparse signal recovery problem in the context of multiple measurement vectors (MMV) when elements in each nonzero row of the solution matrix are temporally corre...
Zhilin Zhang, Bhaskar D. Rao