Sciweavers

11588 search results - page 2248 / 2318
» Will They Like This
Sort
View
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
FGCS
2010
126views more  FGCS 2010»
13 years 7 months ago
Perspectives on grid computing
Grid computing has been the subject of many large national and international IT projects in the past. However, it seems that the general expectations in Grids have not come true. ...
Uwe Schwiegelshohn, Rosa M. Badia, Marian Bubak, M...
GIS
2010
ACM
13 years 7 months ago
Topological reasoning between complex regions in databases with frequent updates
Reasoning about space has been a considerable field of study both in Artificial Intelligence and in spatial information theory. Many applications benefit from the inference of ...
Arif Khan, Markus Schneider
GIS
2010
ACM
13 years 7 months ago
Detecting nearly duplicated records in location datasets
The quality of a local search engine, such as Google and Bing Maps, heavily relies on its geographic datasets. Typically, these datasets are obtained from multiple sources, e.g., ...
Yu Zheng, Xixuan Fen, Xing Xie, Shuang Peng, James...
GIS
2010
ACM
13 years 7 months ago
Decentralized querying of topological relations between regions without using localization
This paper proposes an efficient, decentralized algorithm for determining the topological relationship between two regions monitored by a geosensor network. Many centralized algo...
Matt Duckham, Myeong Hun Jeong, Sanjiang Li, Joche...
« Prev « First page 2248 / 2318 Last » Next »