Sciweavers

5544 search results - page 47 / 1109
» Three Inadequate Models
Sort
View
MSR
2010
ACM
14 years 21 days ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...
INFOCOM
2006
IEEE
14 years 1 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
CONTEXT
2005
Springer
14 years 1 months ago
'I' as a Pure Indexical and Metonymy as Language Reduction
Most direct reference theorists believe that ‘I’ is a pure indexical. This means that when ‘I’ is uttered, it contributes with the speaker to what is said. But, from some c...
Esther Romero, Belén Soria
HOTOS
2003
IEEE
14 years 28 days ago
Development Tools for Distributed Applications
The emergence of the global Internet has dramatically broadened and changed the computing landscape. In particular, much of the value in contemporary computing systems derives fro...
Mukesh Agrawal, Srinivasan Seshan
WCRE
1995
IEEE
13 years 11 months ago
Observed Idiosyncracies of Relational Database Designs
Several processes have been advanced in the literature for reverse engineering of relational databases. The inputs to these processes are relational tables and available contextua...
Michael R. Blaha, William J. Premerlani