Sciweavers

6153 search results - page 1130 / 1231
» Modeling Cyclic Change
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
IADIS
2003
13 years 9 months ago
Internet Geography: New Spaces of Information
The objective of great investments in telecommunication networks is to approach economies and put an end to the asymmetries. The most isolated regions could be the beneficiaries o...
Jorge Ricardo da Costa Ferreira
IADIS
2003
13 years 9 months ago
Forecasting the Growth of ATM and POS in the Portuguese Banking System
There are several factors that have been influencing and creating deep changes in the Portuguese banking sector. Among these, we can highlight technological innovation, the increa...
Fernando Alberto Freitas Ferreira, Nuno Sidó...
IMAGING
2003
13 years 9 months ago
Group Theoretical Invariants in Color Image Processing
Many image formation processes are complex interactions of several sub-processes and the analysis of the resulting images requires often to separate the influence of these sub-pr...
Reiner Lenz, Linh Viet Tran, Thanh Hai Bui
WSC
2004
13 years 9 months ago
Impact of Production Run Length on Supply Chain Performance
This paper documents an experiment designed to show the value of simulation in understanding the relationship between production run lengths and overall supply chain performance. ...
David J. Parsons, Robin J. Clark, Kevin L. Payette
« Prev « First page 1130 / 1231 Last » Next »