Results 1 - 10
of
11,088
1 OPPORTUNITY AND CONSTRAINTS FOR WIDE ADOPTION OF RFID IN AGRI-FOOD OPPORTUNITIES AND CONSTRAINTS FOR WIDE ADOPTION OF RFID IN
"... RFID is a pervasive technology, which provides appealing opportunities for improving supply chain management and security in the agri-food sector. All over the world, food safety is considered a requirement, and in several countries the traceability of food products is mandatory. Therefore, several ..."
Abstract
- Add to MetaCart
technology seems to be able to bring great opportunities to agri-food, nevertheless, not negligible constraints are slowing its adoption. This survey may provide readers with an exhaustive overview on opportunities and constraints for RFID wide adoption in agri-food.
Differential Cryptanalysis of DES-like Cryptosystems
- CRYPTO'91
, 1991
"... The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature. In t ..."
Abstract
-
Cited by 676 (9 self)
- Add to MetaCart
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature
Maximizing the Spread of Influence Through a Social Network
- In KDD
, 2003
"... Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technological innovations, the sudden and widespread adoption of various strategies in game-theoretic settings, and the effects of ..."
Abstract
-
Cited by 990 (7 self)
- Add to MetaCart
, and the goal is to trigger a large cascade of further adoptions, which set of individuals should we target? We consider this problem in several of the most widely studied models in social network analysis. The optimization problem of selecting the most influential nodes is NP-hard here, and we provide
The STATEMATE Semantics of Statecharts
, 1996
"... This article describes the semantics of the language of statecharts as implenented in the STATEMATE system [Harel et al. 1990; Harel and Politi 1996]. The initial version of this semantics was developed by a team about.10 years ago. With the added experience of the users of the system it has since b ..."
Abstract
-
Cited by 657 (12 self)
- Add to MetaCart
the report so as to make it more widely accessible, to alleviate some of the confusion about the "official semantics of the language, and to counter a number of incorrect comments made in the literature about the way statecharts have been implemented. For example, the survey [yon der Beek 1994] does
Illusion and well-being: A social psychological perspective on mental health.
- Psychological Bulletin,
, 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract
-
Cited by 988 (20 self)
- Add to MetaCart
-evaluations, exaggerated perceptions of control or mastery, and unrealistic optimism-can serve a wide variety of cognitive, affective, and social functions. We also attempt to resolve the following paraPreparation of this article was supported by National Science Foundation Grant BNS 83-08524, National Cancer Institute
Making Gnutella-like P2P Systems Scalable
, 2003
"... Napster pioneered the idea of peer-to-peer file sharing, and supported it with a centralized file search facility. Subsequent P2P systems like Gnutella adopted decentralized search algorithms. However, Gnutella's notoriously poor scaling led some to propose distributed hash table solutions to t ..."
Abstract
-
Cited by 429 (1 self)
- Add to MetaCart
Napster pioneered the idea of peer-to-peer file sharing, and supported it with a centralized file search facility. Subsequent P2P systems like Gnutella adopted decentralized search algorithms. However, Gnutella's notoriously poor scaling led some to propose distributed hash table solutions
A comparative study of energy minimization methods for Markov random fields
- IN ECCV
, 2006
"... One of the most exciting advances in early vision has been the development of efficient energy minimization algorithms. Many early vision tasks require labeling each pixel with some quantity such as depth or texture. While many such problems can be elegantly expressed in the language of Markov Ran ..."
Abstract
-
Cited by 415 (36 self)
- Add to MetaCart
Random Fields (MRF’s), the resulting energy minimization problems were widely viewed as intractable. Recently, algorithms such as graph cuts and loopy belief propagation (LBP) have proven to be very powerful: for example, such methods form the basis for almost all the top-performing stereo methods
Improving MapReduce Performance in Heterogeneous Environments
, 2008
"... MapReduce is emerging as an important programming model for large-scale data-parallel applications such as web indexing, data mining, and scientific simulation. Hadoop is an open-source implementation of MapReduce enjoying wide adoption and is often used for short jobs where low response time is cri ..."
Abstract
-
Cited by 350 (19 self)
- Add to MetaCart
MapReduce is emerging as an important programming model for large-scale data-parallel applications such as web indexing, data mining, and scientific simulation. Hadoop is an open-source implementation of MapReduce enjoying wide adoption and is often used for short jobs where low response time
Do Farmers Not Widely Adopt Environmentally Friendly Technologies? Lesson from Integrated Pest Management (IPM)
"... Integrated pest management (IPM) is such approach where pest are controlled by following a number of technologies that are environmentally sound. The study attempted to determine the adoption rate of IPM by the vegetable growers in Bangladesh for better understanding about what extent farmers adopt ..."
Abstract
- Add to MetaCart
Integrated pest management (IPM) is such approach where pest are controlled by following a number of technologies that are environmentally sound. The study attempted to determine the adoption rate of IPM by the vegetable growers in Bangladesh for better understanding about what extent farmers adopt
• Cognizant 20-20 Insights Traveling the Big Data Super Highway: Realizing Enterprise-wide Adoption and Advantage
"... When it comes to big data, companies big and small need to determine not only the best fit of new technology with existing investments but also how to incorporate proven best practices that enable them to run better and run differently. Executive Summary The avalanche of data that is stressing — and ..."
Abstract
- Add to MetaCart
When it comes to big data, companies big and small need to determine not only the best fit of new technology with existing investments but also how to incorporate proven best practices that enable them to run better and run differently. Executive Summary The avalanche of data that is stressing — and often collapsing — traditional computing systems is matched only by the staggering number of technical and architectural choices available to those seeking business value from this environment. Therefore, big data platforms can be a double-edged sword. While they provide significant IT cost reductions and the power to analyze much larger data sets than previously possible with available IT capabilities, they can also unleash
Results 1 - 10
of
11,088