Sciweavers

2594 search results - page 293 / 519
» Stabilization of Systems with Changing Dynamics
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
Anonymous Tracking Using RFID Tags
Abstract—The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags i...
Murali S. Kodialam, Thyaga Nandagopal, Wing Cheong...
137
Voted
ADC
2006
Springer
135views Database» more  ADC 2006»
15 years 9 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
126
Voted
POPL
1995
ACM
15 years 7 months ago
Parametric Program Slicing
Program slicing is a technique for isolating computational threads in programs. In this paper, we show how to mechanically extract a family of practical algorithms for computing s...
John Field, G. Ramalingam, Frank Tip
121
Voted
CN
2004
163views more  CN 2004»
15 years 3 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
DEXAW
2000
IEEE
137views Database» more  DEXAW 2000»
15 years 8 months ago
A Holonic Component-Based Approach to Reconfigurable Manufacturing Control Architecture
Holonic Manufacturing Systems have emerged over the last seven years as strategy for manufacturing control system design. A new approach called Holonic ComponentBased Architecture...
Jin-Lung Chirn, Duncan C. McFarlane