Sciweavers

3638 search results - page 69 / 728
» Distribution chain security
Sort
View
EOR
2007
69views more  EOR 2007»
13 years 9 months ago
Incorporating inventory and routing costs in strategic location models
We consider a supply chain design problem where the decision maker needs to decide the number and locations of the distribution centers (DCs). Customers face random demand, and ea...
Zuo-Jun Max Shen, Lian Qi
ICWSM
2009
13 years 6 months ago
Gesundheit! Modeling Contagion through Facebook News Feed
Whether they are modeling bookmarking behavior in Flickr or cascades of failure in large networks, models of diffusion often start with the assumption that a few nodes start long ...
Eric Sun, Itamar Rosenn, Cameron Marlow, Thomas M....
WWW
2002
ACM
14 years 9 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
EUROPLOP
2006
13 years 10 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
ESORICS
2009
Springer
14 years 3 months ago
Untraceable Tags Based on Mild Assumptions
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
Carlo Blundo, Angelo De Caro, Giuseppe Persiano