Sciweavers

390 search results - page 52 / 78
» Use It or Lose It
Sort
View
ACMICEC
2006
ACM
110views ECommerce» more  ACMICEC 2006»
14 years 22 days ago
Learning inventory management strategies for commodity supply chains with customer satisfaction
In this paper, we look at a supply chain of commodity goods where customer demand is uncertain and partly based on reputation, and where raw material replenishment is uncertain in...
Jeroen van Luin, Han La Poutré, J. Will M. ...
ANSS
2004
IEEE
14 years 22 days ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
ICDCS
1995
IEEE
14 years 16 days ago
A Competitive Analysis for Retransmission Timeout
Protocols that provide reliable communicationon top of a network that can lose packets rely on periodically retransmitting packets. The choice of retransmission timeout critically...
Shlomi Dolev, Michael Kate, Jennifer L. Welch
VMV
2008
190views Visualization» more  VMV 2008»
13 years 10 months ago
GPU-Based Streamlines for Surface-Guided 3D Flow Visualization
Visualizing 3D flow fields intrinsically suffers from problems of clutter and occlusion. A common practice to alleviate these issues is to restrict the visualization to feature su...
Markus Üffinger, Thomas Klein, Magnus Strenge...
DMDW
2001
307views Management» more  DMDW 2001»
13 years 10 months ago
An Analysis of Many-to-Many Relationships Between Fact and Dimension Tables in Dimensional Modeling
Star schema, which maintains one-to-many relationships between dimensions and a fact table, is widely accepted as the most viable data representation for dimensional analysis. Rea...
Il-Yeol Song, William Rowen, Carl Medsker, Edward ...