In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
This paper investigates the effects of demand risk on the performance of supply chain in continuous time setting. The inventory level has been modeled as a jump-diffusion process ...
We investigate the value of pooling capacity in supply chains that serve product demands of different variabilities. We build and analyze models that integrate production queuing...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...