Sciweavers

2149 search results - page 416 / 430
» Form over Substance
Sort
View
IOR
2010
169views more  IOR 2010»
13 years 5 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
IS
2010
13 years 5 months ago
Extracting a largest redundancy-free XML storage structure from an acyclic hypergraph in polynomial time
Given a hypergraph and a set of embedded functional dependencies, we investigate the problem of determining the conditions under which we can efficiently generate redundancy-free ...
Wai Yin Mok, Joseph Fong, David W. Embley
JSAC
2010
78views more  JSAC 2010»
13 years 5 months ago
Evolution of Internet Address Space Deaggregation: Myths and Reality
—Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. There is widespread belief in a high and fast growing number of ASs that deagg...
Luca Cittadini, Wolfgang Mühlbauer, Steve Uhl...
JTAER
2010
135views more  JTAER 2010»
13 years 5 months ago
Developing Trust In Virtual Software Development Teams
Today globally distributed software development has become the norm for many organizations and the popularity of implementing such an approach continues to increase. In these circ...
Valentine Casey
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 5 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang