This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to dynamically ensure the performance for the desired level of security. The adapti...
We develop a hierarchical distributed production planning and control methodology, called DISCS, for a large and unstable semiconductor manufacturing process. The upper layer of D...
Modern developments in the use of information technology within command and control allow unprecedented degrees of flexibility in the way teams deal with tasks. These developments...
Robert J. Houghton, Chris Baber, Malcolm Cowton, G...
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
RFID has been gaining popularity for inventory control, object tracking, and supply chain management in warehouses, retail stores, hospitals, etc. Periodically and automatically es...