This paper discusses a new approach that facilitates the use of simulation in supply chain applications, especially for manufacturing-related activities. A neutral information rep...
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Vehicular network became one of the most active and emerging fields of research during last decade. Its use in diversified applications (for example safe driving, congestion avoid...
Chowdhury Sayeed Hyder, Anindya Iqbal, Une Thoing ...
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Caching in the Placeless Documents system poses new challenges because users can attach active properties to documents. Active properties can modify the document's content as...
Eyal de Lara, Karin Petersen, Douglas B. Terry, An...