Sciweavers

2038 search results - page 358 / 408
» Loops under Strategies
Sort
View
CEAS
2005
Springer
14 years 2 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
14 years 1 months ago
The Value Relevance of Information Technology Investment Announcements: Incorporating Industry Strategic IT Role
: This research note both confirms and extends the value relevance of information technology announcements found by Im et al (2001) and Dos Santos et al. (1993). We extend their wo...
Vernon J. Richardson, Robert W. Zmud
ICRA
1998
IEEE
144views Robotics» more  ICRA 1998»
14 years 28 days ago
The Atacama Desert Trek: Outcomes
In June and July 1997, Nomad, a planetary-relevant mobile robot, traversed more than 220 kilometers across the barren Atacama Desert in Chile, exploring a landscape analogous to t...
Deepak Bapna, Eric Rollins, John Murphy, Mark W. M...
HYBRID
1998
Springer
14 years 27 days ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
VISUALIZATION
1997
IEEE
14 years 27 days ago
Multiresolution compression and reconstruction
This paper presents a framework for multiresolution compression and geometric reconstruction of arbitrarily dimensioned data designed for distributed applications. Although being ...
Oliver G. Staadt, Markus H. Gross, Roger Weber