-
1
-
-
34547367358
-
The Pros and Cons of RFID in Supply Chain Management
-
Washington, DC, USA: IEEE Computer Society
-
K. Michael and L. McCathie, “The Pros and Cons of RFID in Supply Chain Management,” in ICMB '05: Proceedings of the International Conference on Mobile Business. Washington, DC, USA: IEEE Computer Society, 2005, pp. 623-629.
-
(2005)
ICMB '05: Proceedings of the International Conference on Mobile Business
, pp. 623-629
-
-
Michael, K.1
McCathie, L.2
-
2
-
-
10244234003
-
-
Auto-ID center, Tech. Rep
-
G. Chappell, D. Durdan, G. Gilbert, L. Ginsburg, J. Smith, and J. Tobolski, “Auto-ID on Delivery: The Value of Auto-ID Technology in the Retail Supply Chain,” Auto-ID center, Tech. Rep., 2003.
-
(2003)
Auto-ID on Delivery: The Value of Auto-ID Technology in the Retail Supply Chain
-
-
Chappell, G.1
Durdan, D.2
Gilbert, G.3
Ginsburg, L.4
Smith, J.5
Tobolski, J.6
-
3
-
-
85091997174
-
-
EPCglobal, EPCglobal Architecture. Accessed 2010-11-30
-
EPCglobal, EPCglobal Architecture. http://www.epcglobalinc.org/standards. Accessed 2010-11-30.
-
-
-
-
5
-
-
85091966993
-
-
Europa.eu Press Release. Customs: Millions of illegal medicines stopped by "MEDI-FAKE action. IP/08/1980
-
Europa.eu Press Release. Customs: Millions of illegal medicines stopped by "MEDI-FAKE" action. IP/08/1980. 2008.
-
(2008)
-
-
-
6
-
-
74349089033
-
A Simulation of the Pharmaceutical Supply Chain to Provide Realistic Test Data
-
Porto, Portugal
-
J. Mueller, C. Popke, M. Urbat, A. Zeier, and H. Plattner, “A Simulation of the Pharmaceutical Supply Chain to Provide Realistic Test Data,” Proceedings of the 2009 International Conference on Advances in System Simulation (SIMUL'09), Porto, Portugal, pp. 44-49, 2009.
-
(2009)
Proceedings of the 2009 International Conference on Advances in System Simulation (SIMUL'09)
, pp. 44-49
-
-
Mueller, J.1
Popke, C.2
Urbat, M.3
Zeier, A.4
Plattner, H.5
-
7
-
-
3042647734
-
Interoperability of peer-to-peer file sharing protocols
-
S. M. Lui and S. H. Kwok, “Interoperability of peer-to-peer file sharing protocols,” SIGecom Exch., vol. 3, no. 3, pp. 25-33, 2002.
-
(2002)
SIGecom Exch
, vol.3
, Issue.3
, pp. 25-33
-
-
Lui, S. M.1
Kwok, S. H.2
-
8
-
-
0035331708
-
JXTA: A Network Programming Environment
-
L. Gong, “JXTA: A Network Programming Environment,” IEEE Internet Computing, vol. 5, pp. 88-95, 2001.
-
(2001)
IEEE Internet Computing
, vol.5
, pp. 88-95
-
-
Gong, L.1
-
9
-
-
12444292136
-
JXTA 2: A high-performance, massively scalable P2P network
-
S. Li, “JXTA 2: A high-performance, massively scalable P2P network,” IBM developerWorks, Tech. Rep., 2003.
-
(2003)
IBM developerWorks, Tech. Rep
-
-
Li, S.1
-
10
-
-
41549110871
-
Discovery Services - Enabling RFID Traceability in EPCglobal Networks
-
S. Beier, T. Grandison, K. Kailing, and R. Rantzau, “Discovery Services - Enabling RFID Traceability in EPCglobal Networks,” Proc. of the 13th International Conference on Management of Data (CO-MAD), 2006.
-
(2006)
Proc. of the 13th International Conference on Management of Data (CO-MAD)
-
-
Beier, S.1
Grandison, T.2
Kailing, K.3
Rantzau, R.4
-
11
-
-
85091986045
-
High level design for Discovery Services
-
U. of Cambridge
-
U. of Cambridge, A. wireless, B. Research, and S. Research, “High level design for Discovery Services,” SAP Research, Tech. Rep., 2007.
-
(2007)
SAP Research, Tech. Rep
-
-
wireless, A.1
Research, B.2
Research, S.3
-
12
-
-
74549162364
-
Implementation and testing of an epcglobal-aware discovery service for item-level traceability
-
U. Barchetti, A. Bucciero, M. D. Blasi, L. Mainetti, and L. Patrono, “Implementation and testing of an epcglobal-aware discovery service for item-level traceability,” in ICUMT, 2009, pp. 1-8.
-
(2009)
ICUMT
, pp. 1-8
-
-
Barchetti, U.1
Bucciero, A.2
Blasi, M. D.3
Mainetti, L.4
Patrono, L.5
-
13
-
-
79951498653
-
An efficient distributed discovery service for epcglobal network in nested package scenarios
-
Press, Corrected Proof, [Online]. Available
-
P. Manzanares-Lopez, J. P. Muñoz-Gea, J. Malgosa-Sanahuja, and J. C. Sanchez-Aarnoutse, “An efficient distributed discovery service for epcglobal network in nested package scenarios,” Journal of Network and Computer Applications, vol. In Press, Corrected Proof, pp. -, 2010. [Online]. Available: http://www.sciencedirect.com/science/article/B6WKB50297NN-3/2/80d898ed6ae19f21c6d6baaaa2bfd902
-
(2010)
Journal of Network and Computer Applications
-
-
Manzanares-Lopez, P.1
Muñoz-Gea, J. P.2
Malgosa-Sanahuja, J.3
Sanchez-Aarnoutse, J. C.4
-
15
-
-
77951762055
-
-
EPCglobal. version 1.4
-
EPCglobal. Tag Data Standard, version 1.4, 2008.
-
(2008)
Tag Data Standard
-
-
-
16
-
-
36949028920
-
PKI design for the real world
-
New York, NY, USA: ACM, [Online]. Available
-
P. Gutmann, “PKI design for the real world,” in Proceedings of the 2006 workshop on New security paradigms, ser. NSPW'06. New York, NY, USA: ACM, 2007, pp. 109-116. [Online]. Available: http://doi.acm.org/10.1145/1278940.1278958
-
(2007)
Proceedings of the 2006 workshop on New security paradigms, ser. NSPW'06
, pp. 109-116
-
-
Gutmann, P.1
-
17
-
-
84882980040
-
Plug-and-play PKI: a PKI your mother can use
-
Berkeley, CA, USA: USENIX Association, [Online]. Available
-
P. Gutmann, “Plug-and-play PKI: a PKI your mother can use,” in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12. Berkeley, CA, USA: USENIX Association, 2003, pp. 4-4. [Online]. Available: http://portal.acm.org/citation.cfm?id=1251353.1251357
-
(2003)
Proceedings of the 12th conference on USENIX Security Symposium
, vol.12
, pp. 4-4
-
-
Gutmann, P.1
|