Sciweavers

3483 search results - page 85 / 697
» Forward
Sort
View
126
Voted
ACSW
2006
15 years 4 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
121
Voted
FLAIRS
2006
15 years 4 months ago
Fast Generation of a Sequence of Trained and Validated Feed-Forward Networks
In this paper, three approaches are presented for generating and validating sequences of different size neural nets. First, a growing method is given along with several weight ini...
Pramod Lakshmi Narasimha, Walter Delashmit, Michae...
122
Voted
EUNIS
2001
15 years 4 months ago
Moving forward in e-business / Distribution of scientific content via intermediaries
preferred abstracting and indexing databases to full text. Librarians and information professionals want the choice to be able to purchase subject orientated packages of electronic...
Meinhard Kettler
87
Voted
ECIS
2003
15 years 4 months ago
Critical realism: a way forward in IS research
Although different strands of “post-approaches” and “post-theories”, for example, grounded theory and structuration theory, have gained popularity in Information Systems (...
Sven A. Carlsson