Opportunities and Barriers for Niche Marketing of Lamb in European LFAs based on Consumer Attitudes to Product Quality [PDF]
With commodity prices continuing to decrease and with policy constraint that farmers cannot easily increase their incomes by increasing volumes of production, they must find alternative ways to maintain their standard of living.
Ashworth, Stuart +4 more
core +1 more source
Change and the Poetics of Plenitude in Wallace Stevens and John Ashbery [PDF]
The essay attends to a paradox found in some crucial poetic efforts by Wallace Stevens and John Ashbery. In some of their most important poetic works Stevens and Ashbery take on the task of positioning the poem toward the plurality of reality, the ...
Bartczak, Kacper
core +2 more sources
Graphical Encoding of a Spatial Logic for the pi-Calculus [PDF]
This paper extends our graph-based approach to the verification of spatial properties of π-calculus specifications. The mechanism is based on an encoding for mobile calculi where each process is mapped into a graph (with interfaces) such that the ...
A. Corradini +18 more
core +3 more sources
Book Review: Majesty and Meekness: A Comparative Study of Contrast and Harmony in the Concept of God [PDF]
A review of Majesty and Meekness: A Comparative Study of Contrast and Harmony in the Concept of God by John B ...
Stoeber, Michael
core +2 more sources
A Logic for Constraint-based Security Protocol Analysis [PDF]
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties.
Corin, R.J., Etalle, S., Saptawijaya, A.
core +5 more sources
Designing a Fresh Food Supply Chain Network: An Application of Nonlinear Programming
In today’s business environment, many fresh food companies have complex supply networks to distribute their products. For example, agricultural products are distributed through a multiechelon supply chain which includes agricultural association ...
Yu-Chung Tsao
doaj +1 more source
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous ...
H.Chen, H.Wang, R.Roman
core +1 more source
Fresh product e-tailer’s optimal fresh-keeping strategy under direct sales mode
In the direct sales model, the e-tailers sell fresh products to consumers in the online market and promise consumers a full-refund policy without return.
Qiufang Huang, Yaqin Hu
semanticscholar +1 more source
Coordination Strategy of Dual-Channel Supply Chain for Fresh Product Under the Fresh-Keeping Efforts
In the context of high loss in the storage and transportation of fresh agricultural products, in order to help company make reasonable fresh-keeping decisions and reduce losses, we established a leading supplier of fresh agricultural products in two level dual channel supply chain model based on consumer utility function, and using Stackelberg game ...
Kejing Zhang, Jingkai Gao
openaire +2 more sources

