EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer Science and Engineering"
Narrow search

Narrow search

Year of publication
Subject
All
Computer Science and Engineering 8 Computer Engineering 1 Internet 1 business communication 1 data integrity 1 electronic commerce 1 electronic data interchange 1 software agents 1 standards 1
more ... less ...
Online availability
All
Free 8
Type of publication
All
Other 8
Language
All
English 7 Undetermined 1
Author
All
Heng Xu 2 Yuan Xie 2 Adam Smith 1 Bhuvan Urgaonkar 1 Chang, Christopher 1 Ge, Weina 1 Guohong Cao 1 Huhns, Michael N. 1 Irani, Nazneen Noshir 1 Jesse Barlow 1 John J. Metzner 1 Kilroy, Katherine 1 MURTHY, JANANI 1 Murali Haran 1 Parbhakar, Manu 1 RAJ ACHARYA 1 Robert T. Collins 1 Sencun Xu 1 Sencun Zhu 1 Shao, Min 1 Stevens, Larry M. 1 Tom F. La Porta 1 Vijaykrishnan Narayanan 1
more ... less ...
Source
All
BASE 8
Showing 1 - 8 of 8
Cover Image
SECURITY AND PRIVACY IN LOW COST RADIO FREQUENCY IDENTIFICATION
MURTHY, JANANI - 2011
Automatic Identification (AutoID) technology has introduced innovative ways to collect,manage information and monitor everything from hospital patients and livestock to library books.Radio frequency Identification (RFID) is the burgeoning AutoID becoming a popular tool inmanufacturing, supply...
Persistent link: https://www.econbiz.de/10009449983
Saved in:
Cover Image
A Signal-Based Approach To an Instrument Driver System
Kilroy, Katherine - 2011
Although automated test equipment standards have improved substantially since as recently as the early 1990s, the standards have not reached the point where instrument models are interchangeable. This may never be achievable, which is why a software solution is necessary in order to allow for...
Persistent link: https://www.econbiz.de/10009450154
Saved in:
Cover Image
Bayesian analysis of small groups in crowds
Ge, Weina - 2010
Crowd analysis is of increasing interest. Sociologists, for example, are interested in studying social influence within and between small groups of individuals traveling in a crowd. However, current empirical studies conducted by human observers are very time-consuming. We propose an automatic,...
Persistent link: https://www.econbiz.de/10009450000
Saved in:
Cover Image
AN INFORMATION-TECHNOLOGY-PEOPLE INVESTIGATION OF INFORMATION PRIVACY- THE CASE OF CHILDRENS ONLINE PRIVACY
Irani, Nazneen Noshir - 2010
The current literature on privacy addresses the need for privacy, user's perceptions of privacy, privacy-enhancing solutions and other related aspects. What lacks is an attempt to present the essence of privacy in a coherent, definable manner within the context of all the related factors that...
Persistent link: https://www.econbiz.de/10009450070
Saved in:
Cover Image
Use of Neural Networks in Financial Trading and Asset Allocation
Parbhakar, Manu - 2010
Recent research has been focused in using neural networks for developing trading strategies and also for tactical financial asset allocation. These strategies for both tactical asset allocation and financial trading in various time horizons are based on attributes of the historic time series...
Persistent link: https://www.econbiz.de/10009450169
Saved in:
Cover Image
A Simple and Fast Vector Symbol Reed-Solomon Burst Error Decoding Method
Chang, Christopher - 2008
Error correction and detection play an important role in data transmission and storage systems. With the increasing demand for higher data transfer rates, reliability and efficiency is a necessity. A commonly used error correcting method is Reed-Solomon decoding. It is particularly attractive...
Persistent link: https://www.econbiz.de/10009450036
Saved in:
Cover Image
Security and Privacy Support for Wireless Sensor Networks
Shao, Min - 2008
Sensor networks are considered useful for a broad spectrum of emerging civil and military applications.However, sensor networks are also confronted with many securitythreats such as node compromise, routing disruption, and false datainjection, because they normally operate in unattended, harsh...
Persistent link: https://www.econbiz.de/10009450113
Saved in:
Cover Image
Automating Supply Chains
Huhns, Michael N.; Stevens, Larry M. - 2001
A recent study found that supply-chain problems cost companies between 9 and 20 percent of their value over a six-month period (T.J. Becker, 2000). The problems range from part shortages to poorly utilized plant capacity. When you place this in the context of the overall business-to-business...
Persistent link: https://www.econbiz.de/10009452179
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...