The Experts below are selected from a list of 17772 Experts worldwide ranked by ideXlab platform
Xiao Huang - One of the best experts on this subject based on the ideXlab platform.
-
a one Vendor multiple buyer production distribution System Vendor managed inventory and retailer managed inventory
Social Science Research Network, 2012Co-Authors: Xiao HuangAbstract:The paper considers a production/distribution System that involves one Vendor and multiple buyers. The buyers belong to an entity that is operationally more cost ecient than the Vendor. We study two settings that have been widely applied in practice: Vendor-managed inventory (VMI) and retailer-managed inventory (RMI). Specically for the two-buyer problem, we characterize equilibrium under RMI and optimal solution under VMI. Our VMI solution is shown to be more cost ecient than others in literature. The general multiple-buyer problem can be non-tractibal and a heuristic is provided to approach decisions under both settings. One surprising nding is that under VMI, the production decision need not involve operational information of the buyers (e.g., inventory/logistic costs) but only their market information (e.g., demand). Numerical results suggest that VMI and just-in-time production are substitutes in improving the eciency of the distribution network. VMI can be more critical for companies with rigid capacity, seasonally low demand, or complex distribution networks.
Toshio Tsunoda - One of the best experts on this subject based on the ideXlab platform.
-
protocol medical image registration method medical image provision method protocol utilization method protocol medical image registration System medical image provision System protocol utilization System Vendor terminal user terminal and protocol man
2003Co-Authors: Toshio TsunodaAbstract:The present invention aims at permitting numerous user terminals to share protocols as common resources. A Vendor terminal or user terminal registers a pair of a protocol and a medical image, which is produced during scanning performed according to the protocol, by recording data in a protocol/medical image database included in a protocol management server. The user terminal acquires a medical image from the protocol management server over a network, and displays it on a display device. Moreover, the user terminal downloads a required protocol from the protocol management server and sets it in a medical diagnostic imaging System.
H Kirschner - One of the best experts on this subject based on the ideXlab platform.
-
discussion of and reply to the achievement of good combustion by improvement of secondary air injection at the montgomery county waste to energy facility
1995Co-Authors: F Hasselriis, Michael Bette, H Kirschner, W Schaefers, W G SchuetzenduebelAbstract:This paper by M. Bette, et al. indicates a willingness of a WTE System Vendor to carry out fundamental research and publish the results so that all can benefit from it. It is timely because it emphasizes the importance of optimizing primary measures to obtain good combustion practice, as opposed to imposing the burden of removing the products of incomplete combustion, only to increase the organic materials in the collected flyash. This article also contains the original authors` reply to the comments.
-
the achievement of good combustion by improvement of secondary air injection at the montgomery county waste to energy facility
1994Co-Authors: Michael Bette, W Schafers, H KirschnerAbstract:Publication of this paper indicates an unfortunately un usual willingness of a WTE System Vendor to carry out fun damental research and publish the results so that all can ben efit from it. It is timely because it emphasizes the importance of optimizing primary measures to obtain "good combustion practice," as opposed to imposing the burden of removing the products of incomplete combustion, only to increase the organic materials in the collected flyash. The principles which must be employed to achieve the "well-stirred reactor," which achieves low CO, are clearly illustrated by the flow-model diagrams. The extremely pow erful tendency for a plume of flame to streak up the furnace has been destroyed by forcing the crossing of streams. One stream contains products of incomplete combustion due to sub-stoiciometric primary air supply, which controls the rate of combustion. The other stream, containing excess oxygen needed to assure burnout of carbon in the bed, must be mixed with the deficient stream to complete burnout, to gether with the secondary air, and reduce the gas tempera tures to achieve the desired retention time above I800°F. In the past, overfire air nozzles have been placed at fixed angles. Would the authors like to have the nozzles designed with a swivelling arrangement? This would make it possible to adjust them actively so that the air placement could be ad justed to suit changes in waste composition. As the waste varies in moisture, the quantity of total com bustion air and the split to underfire and overfire air must be
Johann Knechtel - One of the best experts on this subject based on the ideXlab platform.
-
2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets
IEEE Transactions on Computers, 2020Co-Authors: Mohammed Nabeel, Mohammed Ashraf, Satwik Patnaik, Vassos Soteriou, Ozgur Sinanoglu, Johann KnechtelAbstract:For the first time, we leverage the 2.5D interposer technology to establish System-level security in the face of hardware- and software-centric adversaries. More specifically, we integrate chiplets (i.e., third-party hard intellectual property of complex functionality, like microprocessors) using a security-enforcing interposer. Such hardware organization provides a robust 2.5D root of trust for trustworthy, yet powerful and flexible, computation Systems. The security paradigms for our scheme, employed firmly by design and construction, are: 1) stringent physical separation of trusted from untrusted components and 2) runtime monitoring. The System-level activities of all untrusted commodity chiplets are checked continuously against security policies via physically separated security features. Aside from the security promises, the good economics of outsourced supply chains are still maintained; the System Vendor is free to procure chiplets from the open market, while only producing the interposer and assembling the 2.5D System oneself. We showcase our scheme using the Cortex-M0 core and the AHB-Lite bus by ARM , building a secure 64-core System with shared memories. We evaluate our scheme through hardware simulation, considering different threat scenarios. Finally, we devise a physical-design flow for 2.5D Systems, based on commercial-grade design tools, to demonstrate and evaluate our 2.5D root of trust .
Knechtel Johann - One of the best experts on this subject based on the ideXlab platform.
-
2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets
'Institute of Electrical and Electronics Engineers (IEEE)', 2020Co-Authors: Nabeel Mohammed, Ashraf Mohammed, Patnaik Satwik, Soteriou Vassos, Sinanoglu Ozgur, Knechtel JohannAbstract:Dedicated, after acceptance and publication, in memory of the late Vassos Soteriou. For the first time, we leverage the 2.5D interposer technology to establish System-level security in the face of hardware- and software-centric adversaries. More specifically, we integrate chiplets (i.e., third-party hard intellectual property of complex functionality, like microprocessors) using a security-enforcing interposer. Such hardware organization provides a robust 2.5D root of trust for trustworthy, yet powerful and flexible, computation Systems. The security paradigms for our scheme, employed firmly by design and construction, are: 1) stringent physical separation of trusted from untrusted components, and 2) runtime monitoring. The System-level activities of all untrusted commodity chiplets are checked continuously against security policies via physically separated security features. Aside from the security promises, the good economics of outsourced supply chains are still maintained; the System Vendor is free to procure chiplets from the open market, while only producing the interposer and assembling the 2.5D System oneself. We showcase our scheme using the Cortex-M0 core and the AHB-Lite bus by ARM, building a secure 64-core System with shared memories. We evaluate our scheme through hardware simulation, considering different threat scenarios. Finally, we devise a physical-design flow for 2.5D Systems, based on commercial-grade design tools, to demonstrate and evaluate our 2.5D root of trust.Comment: [v2] Dedicated, after acceptance and publication, in memory of the late Vassos Soteriou. Besides, scaled down some figures for smaller overall file siz