Search Results - "Schapranow, M."
-
1
Surveillance and Outbreak Response Management System (SORMAS) to support the control of the Ebola virus disease outbreak in West Africa
Published in Euro surveillance : bulletin européen sur les maladies transmissibles (26-03-2015)“…In the context of controlling the current outbreak of Ebola virus disease (EVD), the World Health Organization claimed that 'critical determinant of epidemic…”
Get full text
Journal Article -
2
A Formal Model for Enabling RFID in Pharmaceutical Supply Chains
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…The use of RFID technology for anti-counterfeiting involves complex event processing, which exceeds the current state of the art of product tracking and…”
Get full text
Conference Proceeding -
3
Low-cost mutual RFID authentication model using predefined password lists
Published in 2009 16th International Conference on Industrial Engineering and Engineering Management (01-10-2009)“…The use of RFID tags for storing unique identifiers increases the complexity of existing global supply chains. Companies participating in this RFID-aided…”
Get full text
Conference Proceeding -
4
CoMoSeR: Cost model for security-enhanced RFID-aided supply chains
Published in SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks (01-09-2010)“…The pharmaceutical industry suffers increasingly from product counterfeits. Although RFID technology can be used as a basis for an integer and…”
Get full text
Conference Proceeding -
5
Security Extensions for Improving Data Security of Event Repositories in EPCglobal Networks
Published in 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing (01-10-2011)“…Location-based event data is captured in RFID-aided supply chains for tacking individual goods. They are stored in distributed event repositories by involved…”
Get full text
Conference Proceeding -
6
Securing EPCglobal Object Name Service - Privacy Enhancements for Anti-counterfeiting
Published in 2011 Second International Conference on Intelligent Systems, Modelling and Simulation (01-01-2011)“…In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the…”
Get full text
Conference Proceeding -
7
Shared Table Access Pattern Analysis for Multi-Tenant Applications
Published in 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE) (01-09-2008)“…With the rise of applications in the area of software as a service it becomes crucial to operate profitable even with small profit margins. The possibility of…”
Get full text
Conference Proceeding -
8
Enabling real-time charging for smart grid infrastructures using in-memory databases
Published in IEEE Local Computer Network Conference (01-10-2010)“…The emerging trend towards smart grids defines new requirements for designing enterprise applications for the energy market. Current solutions were built to…”
Get full text
Conference Proceeding -
9
Binary search tree visualization algorithm
Published in 2009 16th International Conference on Industrial Engineering and Engineering Management (01-10-2009)“…Binary search tree is a very common data structure in computer programming. Working with large BSTs can become complicated and inefficient unless a programmer…”
Get full text
Conference Proceeding -
10
RFID middleware as a service - Enabling small and medium-sized enterprises to participate in the EPC network
Published in 2009 16th International Conference on Industrial Engineering and Engineering Management (01-10-2009)“…RFID technology has been adopted in the market. It is used in large enterprises for different approaches with great success. The rise of RFID technology is…”
Get full text
Conference Proceeding -
11
Operational Reporting Using Navigational SQL
Published in 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE) (01-09-2008)“…Ad-hoc analytics on top of OLTP data provides direct business value in that business users can directly interact with the system to gather information for…”
Get full text
Conference Proceeding -
12
Ensuring service backwards compatibility with Generic Web Services
Published in 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems (18-05-2009)“…Ensuring compatibility in service-oriented systems is a challenging task. This article addresses the challenge of maintaining Web service backwards…”
Get full text
Conference Proceeding