Sciweavers

1265 search results - page 237 / 253
» Finding the Key to a Synapse
Sort
View
EJIS
2010
112views more  EJIS 2010»
13 years 7 months ago
Toward an 'IT Conflict-Resistance Theory': action research during IT pre-implementation
Most empirical research on users' resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done ...
Regis Meissonier, Emmanuel Houzé
FOCM
2008
100views more  FOCM 2008»
13 years 7 months ago
A Unifying Local Convergence Result for Newton's Method in Riemannian Manifolds
We consider the problem of finding a singularity of a differentiable vector field X defined on a complete Riemannian manifold. We prove a unified result for the existence and local...
Felipe Alvarez, Jérôme Bolte, Julien ...
COMCOM
2006
154views more  COMCOM 2006»
13 years 7 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
COR
2006
82views more  COR 2006»
13 years 7 months ago
Batching work and rework processes with limited deterioration of reworkables
We study the problem of planning the production of new and recovering defective items of the same product manufactured on the same facility. Items of the product are produced in b...
Karl Inderfurth, Adam Janiak, Mikhail Y. Kovalyov,...
DCG
2006
110views more  DCG 2006»
13 years 7 months ago
High-Dimensional Centrally Symmetric Polytopes with Neighborliness Proportional to Dimension
Let A be a d by n matrix, d < n. Let C be the regular cross polytope (octahedron) in Rn . It has recently been shown that properties of the centrosymmetric polytope P = AC are ...
David L. Donoho