Sciweavers

1583 search results - page 215 / 317
» Issues in data stream management
Sort
View
HICSS
2007
IEEE
143views Biometrics» more  HICSS 2007»
14 years 5 months ago
B-to-B E-Commerce: Assessing the Impacts of RFID Technology in a Five Layer Supply Chain
This paper attempts to track key performance indicators in order to assess the impacts of RFID technology in a five layer supply chain in the utility sector. Findings point to som...
Ygal Bendavid, Élisabeth Lefebvre, Louis A....
IJCAI
2007
14 years 10 days ago
Gossip-Based Aggregation of Trust in Decentralized Reputation Systems
Decentralized reputation systems have of late emerged as the prominent method of establishing trust among selfish agents in today’s online environments. A key issue is the effic...
Ariel D. Procaccia, Yoram Bachrach, Jeffrey S. Ros...
VCIP
2003
153views Communications» more  VCIP 2003»
14 years 8 days ago
Flexible authentication of images
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility ...
Yanjiang Yang, Feng Bao, Robert H. Deng
WCET
2003
14 years 8 days ago
Challenges in Calculating the WCET of a Complex On-board Satellite Application
Calculating the WCET of mission-critical satellite applications is a challenging issue. The European Space Agency is currently undertaking the CryoSat mission, consisting of a rad...
Manuel Rodríguez, Nuno Silva, João E...
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 11 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao