Sciweavers

370 search results - page 60 / 74
» An efficient implementation of a new DOP model
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 7 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
WSC
1998
13 years 8 months ago
Using Simulation to Optimize a Horizontal Carousel Storage System
Carousel storage systems are often used to increase storage density, throughput and efficiency while reducing inventory and man-hours. The Hewlett-Packard company has developed a ...
Todd LeBaron, Michael L. Hoffman
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
AAAI
2000
13 years 8 months ago
DATALOG with Constraints - An Answer-Set Programming System
Answer-set programming (ASP) has emerged recently as a viable programming paradigm well attuned to search problems in AI, constraint satisfaction and combinatorics. Propositional ...
Deborah East, Miroslaw Truszczynski
CONCURRENCY
2002
99views more  CONCURRENCY 2002»
13 years 7 months ago
A distributed computing environment for interdisciplinary applications
Practical applications are generally interdisciplinary in nature. The technology is well matured for addressing individual discipline applications and not for interdisciplinary ap...
Jerry A. Clarke, Raju R. Namburu