Sciweavers

6 search results - page 1 / 2
» Value Capture and Value Networks in Open Source Vendor Strat...
Sort
View
HICSS
2007
IEEE
80views Biometrics» more  HICSS 2007»
13 years 11 months ago
Value Capture and Value Networks in Open Source Vendor Strategies
Firms involved in open source software face inherent limits on their ability to appropriate returns from technological innovation. Here I examine the business models used by IT ve...
Joel West
CP
2006
Springer
13 years 9 months ago
Boosting Open CSPs
In previous work, a new approach called Open CSP (OCSP) was defined as a way of integrate information gathering and problem solving. Instead of collecting all variable values befor...
Santiago Macho González, Carlos Ansó...
CORR
2008
Springer
88views Education» more  CORR 2008»
13 years 5 months ago
Coding Strategies for Noise-free Relay Cascades with Half-Duplex Constraint
Abstract--Two types of noise-free relay cascades are investigated. Networks where a source communicates with a distant receiver via a cascade of half-duplex constrained relays, and...
Tobias Lutz, Christoph Hausl, Ralf Koetter
CSCW
2012
ACM
12 years 1 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...
GAMESEC
2010
150views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Adversarial Control in a Delay Tolerant Network
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
Eitan Altman, Tamer Basar, Veeraruna Kavitha