Search Results - "Schapranow, M."

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    A Formal Model for Enabling RFID in Pharmaceutical Supply Chains by Schapranow, M-P, Zeier, A, Plattner, H

    “…The use of RFID technology for anti-counterfeiting involves complex event processing, which exceeds the current state of the art of product tracking and…”
    Get full text
    Conference Proceeding
  3. 3

    Low-cost mutual RFID authentication model using predefined password lists by Schapranow, M.-P., Muller, J., Enderlein, S., Helmich, M., Zeier, A.

    “…The use of RFID tags for storing unique identifiers increases the complexity of existing global supply chains. Companies participating in this RFID-aided…”
    Get full text
    Conference Proceeding
  4. 4

    CoMoSeR: Cost model for security-enhanced RFID-aided supply chains by Schapranow, M, Nagora, M, Zeier, A

    “…The pharmaceutical industry suffers increasingly from product counterfeits. Although RFID technology can be used as a basis for an integer and…”
    Get full text
    Conference Proceeding
  5. 5

    Security Extensions for Improving Data Security of Event Repositories in EPCglobal Networks by Schapranow, M., Zeier, A., Plattner, H.

    “…Location-based event data is captured in RFID-aided supply chains for tacking individual goods. They are stored in distributed event repositories by involved…”
    Get full text
    Conference Proceeding
  6. 6

    Securing EPCglobal Object Name Service - Privacy Enhancements for Anti-counterfeiting by Schapranow, M, Zeier, A, Leupold, F, Schubotz, T

    “…In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the…”
    Get full text
    Conference Proceeding
  7. 7

    Shared Table Access Pattern Analysis for Multi-Tenant Applications by Grund, M., Schapranow, M., Krueger, J., Schaffner, J., Bog, A.

    “…With the rise of applications in the area of software as a service it becomes crucial to operate profitable even with small profit margins. The possibility of…”
    Get full text
    Conference Proceeding
  8. 8

    Enabling real-time charging for smart grid infrastructures using in-memory databases by Schapranow, M P, Kühne, R, Zeier, A, Plattner, H

    Published in IEEE Local Computer Network Conference (01-10-2010)
    “…The emerging trend towards smart grids defines new requirements for designing enterprise applications for the energy market. Current solutions were built to…”
    Get full text
    Conference Proceeding
  9. 9

    Binary search tree visualization algorithm by Borovskiy, V., Muller, J., Schapranow, M.-P., Zeier, A.

    “…Binary search tree is a very common data structure in computer programming. Working with large BSTs can become complicated and inefficient unless a programmer…”
    Get full text
    Conference Proceeding
  10. 10

    RFID middleware as a service - Enabling small and medium-sized enterprises to participate in the EPC network by Muller, J., Schapranow, M., Helmich, M., Enderlein, S., Zeier, A.

    “…RFID technology has been adopted in the market. It is used in large enterprises for different approaches with great success. The rise of RFID technology is…”
    Get full text
    Conference Proceeding
  11. 11

    Operational Reporting Using Navigational SQL by Grund, M., Krueger, J., Schaffner, J., Schapranow, M., Bog, A.

    “…Ad-hoc analytics on top of OLTP data provides direct business value in that business users can directly interact with the system to gather information for…”
    Get full text
    Conference Proceeding
  12. 12

    Ensuring service backwards compatibility with Generic Web Services by Borovskiy, Vadym, Mueller, Juergen, Schapranow, Matthieu-Patrick, Zeier, Alexander

    “…Ensuring compatibility in service-oriented systems is a challenging task. This article addresses the challenge of maintaining Web service backwards…”
    Get full text
    Conference Proceeding