Sciweavers

5790 search results - page 1052 / 1158
» Distributed programming with distributed authorization
Sort
View
ICETE
2004
159views Business» more  ICETE 2004»
13 years 10 months ago
When Business Models Go Bad: The Music Industry's Future
: The music industry is an interesting example for how business models from the pre-Internet area can get into trouble in the new Internet-based economy. Since 2000, the music indu...
Erik Wilde, Jacqueline Schwerzmann
ICMLA
2004
13 years 10 months ago
Two new regularized AdaBoost algorithms
AdaBoost rarely suffers from overfitting problems in low noise data cases. However, recent studies with highly noisy patterns clearly showed that overfitting can occur. A natural s...
Yijun Sun, Jian Li, William W. Hager
DOA
2001
89views more  DOA 2001»
13 years 10 months ago
Transparent Dissemination of Adapters in Jini
Jini is a Java-based technology for 'spontaneous' distributed computing which enables programs to dynamically discover nearby services by means of a type-based lookup me...
Julien Vayssière
ICIS
2003
13 years 10 months ago
The Economics of Telecommuting: Theory and Evidence
While there has been considerable research on the effect of telecommuting on worker’s productivity and quality of work life, there is considerably less work on the managerial pr...
Guodong Gao, Lorin M. Hitt
USENIX
2001
13 years 10 months ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
« Prev « First page 1052 / 1158 Last » Next »