Sciweavers

2949 search results - page 18 / 590
» Transformations in Information Supply
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
13 years 12 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
ISLPED
2010
ACM
205views Hardware» more  ISLPED 2010»
13 years 7 months ago
Peak power modeling for data center servers with switched-mode power supplies
Accurately modeling server power consumption is critical in designing data center power provisioning infrastructure. However, to date, most research proposals have used average CP...
David Meisner, Thomas F. Wenisch
JCP
2008
139views more  JCP 2008»
13 years 7 months ago
Research on Risk Evaluation in Supply Chain Based on Grey Relational Method
Supply chain risk evaluation is a multi-criteria decision making problem under fuzzy environments. To tackle the problem, this paper firstly identifies and discusses some of the im...
Peide Liu, Tongjuan Wang

Publication
362views
15 years 6 months ago
A Bayesian Incentive Compatible Mechanism for Decentralized Supply Chain Formation
In this paper, we consider a decentralized supply chain formation problem for linear, multi-echelon supply chains when the managers of the individual echelons are autonomous, ratio...
Y. Narahari and Nikesh Kumar Srivastava
HICSS
2003
IEEE
180views Biometrics» more  HICSS 2003»
14 years 25 days ago
A Case Study of Integrating Knowledge Management into the Supply Chain Management Process
To achieve success at supply chain management (SCM), an organization must possess--and share-knowledge about the different facets of the supply chain. Lack of information sharing ...
Nancy C. Shaw, Mary J. Meixell, Francis D. Tuggle