منابع مشابه
So far and yet so near?
Developments in computer and communication technologies over the past ten years aptly support the use of the term global village to describe the present worldwide provision and distribution of information. These technologies are increasingly being employed in Africa, but their presence is not widespread and evenly distributed. Librarians in Africa are establishing the basic tools and organizati...
متن کاملSo Far (Schematically) yet So Near (Semantically)
ion Level Incompatibility Generalization Conflicts Aggregation Conflicts (Semantic Relationship) (Semantic Relationship) Figure 8: Abstraction level incompatibilities and the likely types of semantic proximities In this case there is an inclusion relationship between two con icting objects and hence, they may be considered to have a semantic relationship. semPro(O1, O2) = <ALL, Generalization, ...
متن کاملProximity Operators - So Near And Yet So Far
Testing of the hypothesis that good precision-recall performance can be based entirely on proximity relationships is a focus of current TREC work at ANU. PADRE's \Z-mode" method (based on proximity spans) of scoring relevance has been shown to produce reasonable results for hand-crafted queries in the Adhoc section. It is capable of producing equally good results in database merging and routing...
متن کاملSo near, and yet so far: Managing 'far-away' interferers in dense femto-cell networks
We expect femto-cells to be massively and densely deployed in the future. Numerous existing works on femto-cell interference management assume that the local topology of interfering femto-cells can be sufficiently approximated through sensing, if not already known in advance. We show that this assumption results in poor throughput performance in dense femto-cell networks. For some cell-edge use...
متن کاملCross-Domain Collaborative Anomaly Detection: So Far Yet So Close
Web applications have emerged as the primary means of access to vital and sensitive services such as online payment systems and databases storing personally identifiable information. Unfortunately, the need for ubiquitous and often anonymous access exposes web servers to adversaries. Indeed, network-borne zero-day attacks pose a critical and widespread threat to web servers that cannot be mitig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2002
ISSN: 0028-0836
DOI: 10.1038/420609a