Sciweavers

2089 search results - page 363 / 418
» Finding Environment Guarantees
Sort
View
86
Voted
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 5 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
SIGUCCS
2003
ACM
15 years 5 months ago
Student staff: n. an energetic, brilliant, creative, talented potential rolled into a food-driven, sleep-deprived, unmotivated c
Students are a wonderful resource for any department of a college or university, especially an ITS department. They are inexpensive and abundant. They want to work at strange time...
Karen McRitchie
ICRE
2000
IEEE
15 years 4 months ago
Scenario Evolution: A Closer View on Relationships
In this article we show the results of an extensive research on scenario evolution. We investigated twelve case studies spanning over 200 scenarios that contained over 800 episode...
Karin Breitman, Julio Cesar Sampaio do Prado Leite
SIGMOD
2000
ACM
104views Database» more  SIGMOD 2000»
15 years 4 months ago
Spatial Join Selectivity Using Power Laws
We discovered a surprising law governing the spatial join selectivity across two sets of points. An example of such a spatial join is "find the libraries that are within 10 m...
Christos Faloutsos, Bernhard Seeger, Agma J. M. Tr...
ACSAC
2009
IEEE
15 years 3 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...