Sciweavers

7059 search results - page 1280 / 1412
» Bayesian network management
Sort
View
COCOON
2004
Springer
14 years 2 months ago
Transshipment Through Crossdocks with Inventory and Time Windows
Abstract. The supply chain between manufacturers and retailers always includes transshipments through a network of locations. A major challenge in making demand meet supply has bee...
Andrew Lim, Zhaowei Miao, Brian Rodrigues, Zhou Xu
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
DSOM
2004
Springer
14 years 2 months ago
Using Object-Oriented Constraint Satisfaction for Automated Configuration Generation
In this paper, we describe an approach for automatically generating configurations for complex applications. Automated generation of system co nfigurations is required to allow lar...
Tim Hinrichs, Nathaniel Love, Charles J. Petrie, L...
ISER
2004
Springer
115views Robotics» more  ISER 2004»
14 years 2 months ago
Dynamic Virtual Fences for Controlling Cows
A virtual fence is created by applying an aversive stimulus to an animal when it approaches a predefined boundary. It is implemented by a small animal-borne computer system with a...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
ISSADS
2004
Springer
14 years 2 months ago
Evaluating Location Dependent Queries Using ISLANDS
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new application...
Marie Thilliez, Thierry Delot
« Prev « First page 1280 / 1412 Last » Next »