Sciweavers

948 search results - page 18 / 190
» What can we achieve by arbitrary announcements
Sort
View
CIDR
2003
150views Algorithms» more  CIDR 2003»
13 years 9 months ago
The Database Machine: Old Story, New Slant?
Current database management system technology is not well equipped to provide adequate support for what has been deemed the 3rd wave of computing -- Ubiquitous Computing. Such app...
Julie A. McCann
TIT
1998
90views more  TIT 1998»
13 years 7 months ago
Source Codes as Random Number Generators
—A random number generator generates fair coin flips by processing deterministically an arbitrary source of nonideal randomness. An optimal random number generator generates asy...
Karthik Visweswariah, Sanjeev R. Kulkarni, Sergio ...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 1 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
PRIS
2004
13 years 9 months ago
Learning Text Extraction Rules, without Ignoring Stop Words
Information Extraction (IE) from text /web documents has become an important application area of AI. As the number of web sites and documents has grown dramatically, the users need...
João Cordeiro, Pavel Brazdil
ORGSCI
2008
78views more  ORGSCI 2008»
13 years 7 months ago
The Penguin Has Entered the Building: The Commercialization of Open Source Software Products
Previous literature on open source software (OSS) mostly analyzes organizational issues within communities of developers and users. This paper focuses on profit-oriented organizat...
Andrea Fosfuri, Marco S. Giarratana, Alessandra Lu...