Sciweavers

6300 search results - page 318 / 1260
» We have it easy, but do we have it right
Sort
View
DRM
2003
Springer
15 years 7 months ago
Content and expression-based copy recognition for intellectual property protection
Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years. This paper presents a way of fingerprinting text docu...
Özlem Uzuner, Randall Davis
COMCOM
2006
105views more  COMCOM 2006»
15 years 1 months ago
An observation-based approach towards self-managing web servers
As more business applications have become web enabled, the web server architecture has evolved to provide performance isolation, service differentiation, and QoS guarantees. Vario...
Abhishek Chandra, Prashant Pradhan, Renu Tewari, S...
MOC
1998
92views more  MOC 1998»
15 years 1 months ago
Perturbing polynomials with all their roots on the unit circle
Given a monic real polynomial with all its roots on the unit circle, we ask to what extent one can perturb its middle coefficient and still have a polynomial with all its roots on ...
Michael J. Mossinghoff, Christopher G. Pinner, Jef...
216
Voted
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
16 years 3 months ago
Query Planning with Limited Source Capabilities
In information-integration systems, sources may have diverse and limited query capabilities. In this paper we show that because sources have restrictions on retrieving their infor...
Chen Li, Edward Y. Chang
83
Voted
AGP
1999
IEEE
15 years 6 months ago
Widening Sharing
We study the problem of an efficient and precise sharing analysis of (constraint) logic programs. After recognizing that neither aring nor its non-redundant (but equivalent) abstra...
Enea Zaffanella, Roberto Bagnara, Patricia M. Hill