Sciweavers

3638 search results - page 113 / 728
» Distribution chain security
Sort
View
KES
2008
Springer
13 years 10 months ago
Information Coordination Using Meta-agents in Information Logistics Processes
In order to coordinate and deliver information in the right time and to the right place, theories from multi-agent systems and information logistics are combined. We use agents to ...
Mats Apelkrans, Anne Håkansson
EJC
2002
13 years 10 months ago
Homology of Newtonian Coalgebras
Given a Newtonian coalgebra we associate to it a chain complex. The homology groups of this Newtonian chain complex are computed for two important Newtonian coalgebras arising in ...
Richard Ehrenborg, Margaret Readdy
ICASSP
2011
IEEE
13 years 1 months ago
Modeling temporal correlations in content fingerprints
Previous analysis of content fingerprints has mainly focused on the case of independent and identically distributed fingerprints. Practical fingerprints, however, exhibit corre...
Avinash L. Varna, Min Wu
INFOCOM
2011
IEEE
13 years 1 months ago
Scheduling for small delay in multi-rate multi-channel wireless networks
—This paper considers the problem of designing scheduling algorithms for multi-channel (e.g., OFDM-based) wireless downlink systems. We show that the Server-Side Greedy (SSG) rul...
Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R...
NSPW
2003
ACM
14 years 3 months ago
Bringing security home: a process for developing secure and usable systems
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...