This paper attempts to track key performance indicators in order to assess the impacts of RFID technology in a five layer supply chain in the utility sector. Findings point to som...
Decentralized reputation systems have of late emerged as the prominent method of establishing trust among selfish agents in today’s online environments. A key issue is the effic...
Ariel D. Procaccia, Yoram Bachrach, Jeffrey S. Ros...
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility ...
Calculating the WCET of mission-critical satellite applications is a challenging issue. The European Space Agency is currently undertaking the CryoSat mission, consisting of a rad...
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...