-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM, New York, NY, USA, SIGMOD ’04
-
Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, ACM, New York, NY, USA, SIGMOD ’04, pp 563–574
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
70449598111
-
Dynamic re-order point inventory control with lead-time uncertainty: analysis and empirical investigation
-
Babaï MZ, Syntetos AA, Dallery Y, Nikolopoulos K (2009) Dynamic re-order point inventory control with lead-time uncertainty: analysis and empirical investigation. Int J Prod Res 47(9):2461–2483
-
(2009)
Int J Prod Res
, vol.47
, Issue.9
, pp. 2461-2483
-
-
Babaï, M.Z.1
Syntetos, A.A.2
Dallery, Y.3
Nikolopoulos, K.4
-
3
-
-
84929120460
-
On achieving secure collaboration in supply chains
-
Barkataki S, Zeineddine H (2015) On achieving secure collaboration in supply chains. Inf Syst Front 17(3):691–705
-
(2015)
Inf Syst Front
, vol.17
, Issue.3
, pp. 691-705
-
-
Barkataki, S.1
Zeineddine, H.2
-
4
-
-
2342620667
-
Understanding the meaning of collaboration in the supply chain
-
Barratt M (2004) Understanding the meaning of collaboration in the supply chain. Supply Chain Manag Int J 9(1):30–42
-
(2004)
Supply Chain Manag Int J
, vol.9
, Issue.1
, pp. 30-42
-
-
Barratt, M.1
-
5
-
-
79959306732
-
Secret-sharing schemes: A survey
-
Springer-Verlag, Berlin, Heidelberg, IWCC’11
-
Beimel A (2011) Secret-sharing schemes: a survey. In: Proceedings of the Third International Conference on Coding and Cryptology, Springer-Verlag, Berlin, Heidelberg, IWCC’11, pp 11–46
-
(2011)
In: Proceedings of the Third International Conference on Coding and Cryptology
, pp. 11-46
-
-
Beimel, A.1
-
6
-
-
85098887199
-
Machine learning classification over encrypted data
-
NDSS 2015, San Diego, California, USA
-
Bost R, Popa RA, Tu S, Goldwasser S (2015) Machine learning classification over encrypted data. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA
-
(2015)
In: 22Nd Annual Network and Distributed System Security Symposium
-
-
Bost, R.1
Popa, R.A.2
Tu, S.3
Goldwasser, S.4
-
7
-
-
34250744208
-
An empirical comparison of supervised learning algorithms
-
New York, NY, USA, ICML ’06
-
Caruana R, Niculescu-Mizil A (2006) An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd International Conference on Machine Learning, ACM, New York, NY, USA, ICML ’06, pp 161–168
-
(2006)
Proceedings of the 23Rd International Conference on Machine Learning, ACM
, pp. 161-168
-
-
Caruana, R.1
Niculescu-Mizil, A.2
-
9
-
-
84953876479
-
Machine learning approaches for improving condition-based maintenance of naval propulsion plants
-
Coraddu A, Oneto L, Ghio A, Savio S, Anguita D, Figari M (2016) Machine learning approaches for improving condition-based maintenance of naval propulsion plants. Proc Inst Mech Eng, Part M: J Eng Maritime Environ 230(1):136–153
-
(2016)
Proc Inst Mech Eng, Part M: J Eng Maritime Environ
, vol.230
, Issue.1
, pp. 136-153
-
-
Coraddu, A.1
Oneto, L.2
Ghio, A.3
Savio, S.4
Anguita, D.5
Figari, M.6
-
12
-
-
84877583613
-
On the use of installed base information for spare parts logistics: a review of ideas and industry practice
-
Dekker R, Pinçe Ç, Zuidwijk R, Jalil MN (2013) On the use of installed base information for spare parts logistics: a review of ideas and industry practice. Int J Prod Econ 143(2):536–545
-
(2013)
Int J Prod Econ
, vol.143
, Issue.2
, pp. 536-545
-
-
Dekker, R.1
Pinçe, Ç.2
Zuidwijk, R.3
Jalil, M.N.4
-
13
-
-
54049103566
-
Predictive maintenance policy for a gradually deteriorating system subject to stress
-
Deloux E, Castanier B, Bérenguer C (2009) Predictive maintenance policy for a gradually deteriorating system subject to stress. Reliability Eng Syst Saf 94(2):418–431
-
(2009)
Reliability Eng Syst Saf
, vol.94
, Issue.2
, pp. 418-431
-
-
Deloux, E.1
Castanier, B.2
Bérenguer, C.3
-
14
-
-
73649121229
-
Secure collaborative planning, forecasting, and replenishment
-
Deshpande V, Schwarz LB (2006) Secure collaborative planning, forecasting, and replenishment. CERIAS Tech Report 2006–65:2006
-
(2006)
CERIAS Tech Report
, vol.2006-65
, pp. 2006
-
-
Deshpande, V.1
Schwarz, L.B.2
-
15
-
-
33847014163
-
Efficient supply chain management at the u.s. coast guard using part-age dependent supply replenishment policies
-
Deshpande V, Iyer AV, Cho R (2006) Efficient supply chain management at the u.s. coast guard using part-age dependent supply replenishment policies. Oper Res 54(6):1028–1040
-
(2006)
Oper Res
, vol.54
, Issue.6
, pp. 1028-1040
-
-
Deshpande, V.1
Iyer, A.V.2
Cho, R.3
-
17
-
-
43149118824
-
Sensor-driven prognostic models for equipment replacement and spare parts inventory
-
Elwany AH, Gebraeel NZ (2008) Sensor-driven prognostic models for equipment replacement and spare parts inventory. IIE Trans 40(7):629–639
-
(2008)
IIE Trans
, vol.40
, Issue.7
, pp. 629-639
-
-
Elwany, A.H.1
Gebraeel, N.Z.2
-
18
-
-
84948166287
-
A simple approach to ordinal classification
-
Springer-Verlag, London, UK, UK, EMCL ’01
-
Frank E, Hall M (2001) A simple approach to ordinal classification. In: Proceedings of the 12th European Conference on Machine Learning, Springer-Verlag, London, UK, UK, EMCL ’01, pp 145–156
-
(2001)
In: Proceedings of the 12Th European Conference on Machine Learning
, pp. 145-156
-
-
Frank, E.1
Hall, M.2
-
19
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Mitzenmacher M, ACM, New York, NY, USA, STOC ’09
-
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Mitzenmacher M (ed) Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, ACM, New York, NY, USA, STOC ’09, pp 169–178
-
(2009)
Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
20
-
-
84865518868
-
Homomorphic evaluation of the aes circuit
-
Safavi-Naini R, Canetti R, Lecture Notes in Computer Science, Berlin Heidelberg, Berlin, Heidelberg
-
Gentry C, Halevi S, Smart NP (2012) Homomorphic evaluation of the aes circuit. In: Safavi-Naini R, Canetti R (eds) Advances in Cryptology - CRYPTO 2012, vol 7417. Lecture Notes in Computer Science. Berlin Heidelberg, Berlin, Heidelberg, pp 850–867
-
(2012)
Advances in Cryptology - CRYPTO 2012
, vol.7417
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
21
-
-
0036299795
-
Sources of intermittent demand for aircraft spare parts within airline operations
-
Ghobbar A, Friend C (2002) Sources of intermittent demand for aircraft spare parts within airline operations. J Air Transp Manag 8(4):221–231
-
(2002)
J Air Transp Manag
, vol.8
, Issue.4
, pp. 221-231
-
-
Ghobbar, A.1
Friend, C.2
-
22
-
-
84977080569
-
Conceptual approach for integrating condition monitoring information and spare parts forecasting methods
-
Hellingrath B, Cordes AK (2014) Conceptual approach for integrating condition monitoring information and spare parts forecasting methods. Prod Manuf Res Open Access J 2(1):725–737
-
(2014)
Prod Manuf Res Open Access J
, vol.2
, Issue.1
, pp. 725-737
-
-
Hellingrath, B.1
Cordes, A.K.2
-
23
-
-
33646534620
-
A review on machinery diagnostics and prognostics implementing condition-based maintenance
-
Jardine AK, Lin D, Banjevic D (2006) A review on machinery diagnostics and prognostics implementing condition-based maintenance. Mech Syst Signal Process 20(7):1483–1510
-
(2006)
Mech Syst Signal Process
, vol.20
, Issue.7
, pp. 1483-1510
-
-
Jardine, A.K.1
Lin, D.2
Banjevic, D.3
-
24
-
-
84864248755
-
Fault-tolerant privacy-preserving statistics
-
PETS 2012, Vigo, Spain, July 11-13, Proceedings
-
Jawurek M, Kerschbaum F (2012) Fault-tolerant privacy-preserving statistics. In: Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings, pp 221–238
-
(2012)
In: Privacy Enhancing Technologies - 12Th International Symposium
, vol.2012
, pp. 221-238
-
-
Jawurek, M.1
Kerschbaum, F.2
-
25
-
-
70849105124
-
Adapting privacy-preserving computation to the service provider model
-
Vancouver, BC, Canada, August 29-31, 2009
-
Kerschbaum F (2009) Adapting privacy-preserving computation to the service provider model. In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp 34–41
-
(2009)
Proceedings of the 12Th IEEE International Conference on Computational Science and Engineering, CSE 2009
, pp. 34-41
-
-
Kerschbaum, F.1
-
26
-
-
84960145342
-
Capacity planning for a maintenance service provider with advanced information
-
Kurz J (2016) Capacity planning for a maintenance service provider with advanced information. Eur J Oper Res 251(2):466–477
-
(2016)
Eur J Oper Res
, vol.251
, Issue.2
, pp. 466-477
-
-
Kurz, J.1
-
27
-
-
0343603438
-
Data mining to predict aircraft component replacement
-
Letourneau S, Famili F, Matwin S (1999) Data mining to predict aircraft component replacement. IEEE Intell Syst 14(6):59–66
-
(1999)
IEEE Intell Syst
, vol.14
, Issue.6
, pp. 59-66
-
-
Letourneau, S.1
Famili, F.2
Matwin, S.3
-
29
-
-
84974555530
-
Privacy preserving data mining
-
Bellare M, Springer, Berlin and New York, Lecture notes in computer science, vol
-
Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Bellare M (ed) Advances in cryptology-CRYPTO 2000, Springer, Berlin and New York, Lecture notes in computer science, vol 1880, pp 36–54
-
(2000)
Advances in Cryptology-Crypto 2000
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
30
-
-
84875204064
-
A survey of cost-sensitive decision tree induction algorithms
-
Lomax S, Vadera S (2013) A survey of cost-sensitive decision tree induction algorithms. ACM Comput Surv 45(2):1–35
-
(2013)
ACM Comput Surv
, vol.45
, Issue.2
, pp. 1-35
-
-
Lomax, S.1
Vadera, S.2
-
31
-
-
77951433743
-
Adaptive einflussgröenkombination (aek) - prognosen mit schrittweiser regression und adaptivem gewichten
-
Mertens P, Rässler S, (eds), Physica-Verlag, Heidelberg
-
Matt G (2005) Adaptive einflussgröenkombination (aek) - prognosen mit schrittweiser regression und adaptivem gewichten. In: Mertens P, Rässler S (eds) Prognoserechnung. Physica-Verlag, Heidelberg, pp 125–168
-
(2005)
Prognoserechnung
, pp. 125-168
-
-
Matt, G.1
-
34
-
-
77958041293
-
Current status of machine prognostics in condition-based maintenance: a review
-
Peng Y, Dong M, Zuo MJ (2010) Current status of machine prognostics in condition-based maintenance: a review. Int J Adv Manuf Technol 50(1–4):297–313
-
(2010)
Int J Adv Manuf Technol
, vol.50
, Issue.1-4
, pp. 297-313
-
-
Peng, Y.1
Dong, M.2
Zuo, M.J.3
-
35
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
ACM, New York, NY, USA, SOSP ’11
-
Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (2011) Cryptdb: Protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, ACM, New York, NY, USA, SOSP ’11, pp 85–100
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
36
-
-
84881262361
-
An ideal-security protocol for order-preserving encoding
-
Washington, DC, USA, SP ’13
-
Popa RA, Li FH, Zeldovich N (2013) An ideal-security protocol for order-preserving encoding. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, SP ’13, pp 463–477
-
(2013)
In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 463-477
-
-
Popa, R.A.1
Li, F.H.2
Zeldovich, N.3
-
37
-
-
33744584654
-
Induction of decision trees
-
Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81–106
-
(1986)
Mach Learn
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
39
-
-
0003855464
-
-
John Wiley & Sons, Inc., New York, NY, USA
-
Schneier B (1995) Applied Cryptography (2Nd Ed.): Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York, NY, USA
-
(1995)
Applied Cryptography (2Nd Ed.): Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
40
-
-
85049280669
-
Konzepte des supply-chain-managements—cpfr als unternehmensübergreifende lösung
-
Zentes J, (ed), Gabler, Wiesbaden
-
Seifert D (2006) Konzepte des supply-chain-managements—cpfr als unternehmensübergreifende lösung. In: Zentes J (ed) Handbuch Handel. Gabler, Wiesbaden, pp 781–794
-
(2006)
Handbuch Handel
, pp. 781-794
-
-
Seifert, D.1
-
41
-
-
84922550940
-
More grip on inventory control through improved forecasting: a comparative study at three companies
-
van Wingerden E, Basten R, Dekker R, Rustenburg WD (2014) More grip on inventory control through improved forecasting: a comparative study at three companies. Int J Prod Econ 157:220–237
-
(2014)
Int J Prod Econ
, vol.157
, pp. 220-237
-
-
van Wingerden, E.1
Basten, R.2
Dekker, R.3
Rustenburg, W.D.4
-
42
-
-
36048958238
-
Maintenance logistics in the dutch dredging industry
-
IEEE
-
Veenstra AW, Zuidwijk R, Geerling B (2006) Maintenance logistics in the dutch dredging industry. In: Service Operations and Logistics, and Informatics, 2006. SOLI’06. IEEE International Conference on, IEEE, pp 436–441
-
(2006)
Service Operations and Logistics, and Informatics, 2006. SOLI’06. IEEE International Conference On
, pp. 436-441
-
-
Veenstra, A.W.1
Zuidwijk, R.2
Geerling, B.3
-
43
-
-
34848816825
-
Value of information exchange and synchronization in a multi-tier supply chain
-
Viswanathan S, Widiarta H, Piplani R (2007) Value of information exchange and synchronization in a multi-tier supply chain. Int J Prod Res 45(21):5057–5074
-
(2007)
Int J Prod Res
, vol.45
, Issue.21
, pp. 5057-5074
-
-
Viswanathan, S.1
Widiarta, H.2
Piplani, R.3
-
44
-
-
85029574773
-
Privately evaluating decision trees and random forests
-
Wu DJ, Feng T, Naehrig M, Lauter KE (2016) Privately evaluating decision trees and random forests. PoPETs 4:335–355
-
(2016)
PoPETs
, vol.4
, pp. 335-355
-
-
Wu, D.J.1
Feng, T.2
Naehrig, M.3
Lauter, K.E.4
-
45
-
-
0034813955
-
Intelligent predictive decision support system for condition-based maintenance
-
Yam R, Tse P, Li L, Tu P (2001) Intelligent predictive decision support system for condition-based maintenance. Int J Adv Manuf Technol 17(5):383–391
-
(2001)
Int J Adv Manuf Technol
, vol.17
, Issue.5
, pp. 383-391
-
-
Yam, R.1
Tse, P.2
Li, L.3
Tu, P.4
|