Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 11.435
1.
  • Utility-Privacy Tradeoffs i... Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach
    Sankar, L.; Rajagopalan, S. R.; Poor, H. V. IEEE transactions on information forensics and security, 06/2013, Letnik: 8, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
2.
  • Smart Meter Privacy: A Theo... Smart Meter Privacy: A Theoretical Framework
    Sankar, L.; Rajagopalan, S. R.; Mohajer, S. ... IEEE transactions on smart grid, 06/2013, Letnik: 4, Številka: 2
    Journal Article
    Recenzirano

    The solutions offered to-date for end-user privacy in smart meter measurements, a well-known challenge in the smart grid, have been tied to specific technologies such as batteries or assumptions on ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
3.
  • Phosphodiesterase-4 inhibit... Phosphodiesterase-4 inhibition as a therapeutic strategy for metabolic disorders
    Wu, C.; Rajagopalan, S. Obesity reviews, 20/May , Letnik: 17, Številka: 5
    Journal Article
    Recenzirano

    Summary Phosphodiesterase‐4 (PDE4) hydrolyses cyclic adenosine monophosphate (cAMP), a crucial secondary messenger for cellular adaptation to diverse external stimuli. The activity of PDE4 is tightly ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
4.
  • Complex Conjugated certific... Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network
    Alagarsamy, Sumithra; Rajagopalan, S P PloS one, 10/2017, Letnik: 12, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
5.
  • Product variety, pricing an... Product variety, pricing and differentiation in a supply chain
    Rajagopalan, S.; Xia, Nan European journal of operational research, 02/2012, Letnik: 217, Številka: 1
    Journal Article
    Recenzirano

    ► We model a manufacturer selling many products to two retailers. ► Consumers choose between retailers based on price, variety, search cost. ► High retailer differentiation hurts retailers and ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
6.
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
7.
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
8.
  • Standard vs. Custom Product... Standard vs. Custom Products: Variety, Lead Time, and Price Competition
    Xia, Nan; Rajagopalan, S Marketing science (Providence, R.I.), 09/2009, Letnik: 28, Številka: 5
    Journal Article
    Recenzirano

    In this paper, we study the standardization and customization decisions of two firms in a competitive setting, along with variety, lead time, and price decisions. We incorporate consumer ...
Celotno besedilo
Dostopno za: BFBNIB, CEKLJ, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
9.
  • A stegano - visual cryptogr... A stegano - visual cryptography technique for multimedia security
    Gurunathan, K.; Rajagopalan, S. P. Multimedia tools and applications, 02/2020, Letnik: 79, Številka: 5-6
    Journal Article
    Recenzirano

    Owing to the increasing growth in digital communication as well as the multimedia applications, security has now become a very significant problem in the communication as well as storage space of ...
Celotno besedilo
Dostopno za: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
10.
  • Aggregating vulnerability m... Aggregating vulnerability metrics in enterprise networks using attack graphs
    HOMER, John; SU ZHANG; XINMING OU ... Journal of computer security, 01/2013, Letnik: 21, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Quantifying security risk is an important and yet difficult task in enterprise network security management. While metrics exist for individual software vulnerabilities, there is currently no standard ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 11.435

Nalaganje filtrov