Sciweavers

984 search results - page 188 / 197
» Combining and selecting characteristics of information use
Sort
View
MANSCI
2007
198views more  MANSCI 2007»
13 years 7 months ago
Real Options in Technology Licensing
“Real options” is often viewed as a valuable managerial tool of flexibility and exploration in new technology investment. Real options theory has been criticized, however, due...
Arvids A. Ziedonis
SIGCOMM
2012
ACM
11 years 10 months ago
Network-aware service placement in a distributed cloud environment
We consider a system of compute and storage resources geographically distributed over a large number of locations connected via a wide-area network. By distributing the resources,...
Moritz Steiner, Bob Gaglianello Gaglianello, Vijay...
TVCG
2002
132views more  TVCG 2002»
13 years 7 months ago
Hierarchical Pixel Bar Charts
Simple presentation graphics are intuitive and easy-to-use, but only show highly aggregated data. Bar charts, for example, only show a rather small number of data values and x-y-pl...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal
EDBT
2009
ACM
208views Database» more  EDBT 2009»
14 years 2 months ago
Flexible and efficient querying and ranking on hyperlinked data sources
There has been an explosion of hyperlinked data in many domains, e.g., the biological Web. Expressive query languages and effective ranking techniques are required to convert this...
Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa...
EUROCRYPT
2004
Springer
14 years 24 days ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer