Sciweavers

564 search results - page 56 / 113
» Corner cutting systems
Sort
View
ATAL
2006
Springer
14 years 23 days ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee
CW
2004
IEEE
14 years 23 days ago
Barcode Readers using the Camera Device in Mobile Phones
This paper shows new algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones. The mobile phone system used here consists of a camera, mobil...
Eisaku Ohbuchi, Hiroshi Hanaizumi, Lim Ah Hock
CCS
2008
ACM
13 years 11 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
SODA
1997
ACM
119views Algorithms» more  SODA 1997»
13 years 10 months ago
Map Labeling and Its Generalizations
Map labeling is of fundamental importance in cartography and geographical information systems and is one of the areas targeted for research by the ACM Computational Geometry Impac...
Srinivas Doddi, Madhav V. Marathe, Andy Mirzaian, ...
WSC
2000
13 years 10 months ago
Tire model for simulations of vehicle motion on high and low friction road surfaces
An on-road analytical tire model has been developed to predict tire forces and moments at the tire/road interface. The model is computationally efficient and it only requires a li...
James Lacombe