نتایج جستجو برای: we cannot reject simply it it seems

تعداد نتایج: 6080334  

2014

Take a strip of paper with ‘once upon a time there’ written on one side and ‘was a story that began’ on the other. Twisting the paper and joining the ends produces John Barth’s story Frame-Tale, which prefixes ‘once upon a time there was a story that began’ to itself. In this paper, I argue that the possibility of understanding Frame-Tale cannot be explained by tacit knowledge of a recursive th...

2006
Andriy Panchenko Lexi Pimenidis

There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract therefore difficult to generalize or even identify in real networks. While some papers distinct different attacker types, the usual approach is to present an anonymization technique and then to develop an attacker model for it in order to identify properties o...

Journal: :Rel. Eng. & Sys. Safety 2012
Thierry Alex Mara Stefano Tarantola

Computational models are intensively used in engineering for risk analysis or prediction of future outcomes. Uncertainty and sensitivity analyses are of great help in these purposes. Although several methods exist to perform variance-based sensitivity analysis of model output with independent inputs only a few are proposed in the literature in the case of dependent inputs. This is explained by ...

2016
Panagiotis Koutsouras Sarah Martindale Andy Crabtree

In recent years, we have experienced the proliferation of videogames that have, as their main mode of play, the creation of in-game content. Even though existing literature has looked into various characteristics of these games, one of their aspects that warrants further exploration is the monetisation practices that can emerge in their context. Through our ongoing ethnographic study, we became...

Journal: :J. of Management Information Systems 1991
R. Kelly Rainer Charles A. Snyder Houston H. Carr

As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organization's overall IT risk management. Recent publicity concerning losses incurred by companies becauseofproblcms with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an att...

Journal: :CoRR 2013
Sasa Petrovic Miles Osborne Victor Lavrenko

Twitter has become a major source of data for social media researchers. One important aspect of Twitter not previously considered are deletions – removal of tweets from the stream. Deletions can be due to a multitude of reasons such as privacy concerns, rashness or attempts to undo public statements. We show how deletions can be automatically predicted ahead of time and analyse which tweets are...

2014
Janno von Stülpnagel Jens Ortmann Joerg Schoenfisch

We present a solution for modeling the dependencies of an IT infrastructure and determine the availability of components and services therein using Markov logic networks (MLN). MLNs offer a single representation of probability and first-order logic and are well suited to model dependencies and threats. We identify different kinds of dependency and show how they can be translated into an MLN. Th...

2006
Richard Miller

Low power, high performance, cost, integration, quality — consumer electronics customers demand all of these, with an increasing sense of urgency and diminishing product cycle times. Properly balancing these factors is the key for success in today's consumer electronics semiconductor industry. SOC designers are faced with challenges of not only delivering complex and highly integrated mixed sig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید