Sciweavers

3638 search results - page 13 / 728
» Distribution chain security
Sort
View
ISSE
2008
13 years 9 months ago
Challenges for the Protection of Critical ICT-Based Financial Infrastructures
Abstract: This paper, entitled Challenges for the Protection of Critical ICTBased Financial Infrastructures for the next 5 years, will describe the outcomes of a recently held work...
Bernhard M. Hämmerli, Henning H. Arendt
CORR
2006
Springer
72views Education» more  CORR 2006»
13 years 7 months ago
A secure archive for Voice-over-IP conversations
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signa...
Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
ECIS
2003
13 years 9 months ago
The value of cooperative planning in supply chains. A simulative approach
In this paper we examine, how the benefits of Supply Chain Management, as announced by the literature and widely accepted, can simulatively be proven. We first present selected re...
Luis Martín Díaz, Peter Buxmann
HPCA
2005
IEEE
14 years 8 months ago
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
With the increasing concern of the security on high performance multiprocessor enterprise servers, more and more effort is being invested into defending against various kinds of a...
Youtao Zhang, Lan Gao, Jun Yang 0002, Xiangyu Zhan...
WSC
1998
13 years 9 months ago
Stopping Criterion for a Simulation-Based Optimization Method
We consider a new simulation-based optimization method called the Nested Partitions (NP) method. This method generates a Markov chain and solving the optimization problem is equiv...
Sigurdur Ólafsson, Leyuan Shi