Sciweavers

305 search results - page 6 / 61
» From External to Internal Regret
Sort
View
IEEEARES
2010
IEEE
14 years 2 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
CLEF
2010
Springer
13 years 8 months ago
A Textual-Based Similarity Approach for Efficient and Scalable External Plagiarism Analysis - Lab Report for PAN at CLEF 2010
In this paper we present an approach to detect external plagiarism based on textual similarity. This is an efficient and precise method that can be applied over large sets of docum...
Daniel Micol, Óscar Ferrández, Ferna...
ICPP
2006
IEEE
14 years 1 months ago
A Parallel External-Memory Frontier Breadth-First Traversal Algorithm for Clusters of Workstations
— This paper presents a parallel external-memory algorithm for performing a breadth-first traversal of an implicit graph on a cluster of workstations. The algorithm is a paralle...
Robert Niewiadomski, José Nelson Amaral, Ro...
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 7 months ago
Optimization and AMS Modeling for Design of an Electrostatic Vibration Energy Harvester's Conditioning Circuit with an Auto-Adap
This paper presents an analysis and system-level design of a capacitive harvester of vibration energy composed from a mechanical resonator, capacitive transducer and a conditioning...
Dimitri Galayko, Philippe Basset, Ayyaz Mahmood Pa...
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
14 years 23 days ago
Modeling and Analyzing Communications Infrastructure A Case Study of an International Organization
EnCompass®1 , a web-enabled system for organizational process visualization, analysis, synthesis, and management, provides an interactive vehicle for understanding the influence ...
Michael M. Mann, Ericka Hansen Bryant