Results 1 - 10
of
242
Introduction (to the issue and to zoomusicology)
"... The release of this special issue of TRANS on zoomusicology marks a little historical event. Indeed, this is the very first time in musicological history that a scientific journal decides to devote an entire issue to the topic of animal music. In several cases, a few of which I had the honour to re ..."
Abstract
- Add to MetaCart
animals and the aesthetic sense, including sound communication, through attempts at systematic analysis: Introduction (to the issue and to zoomusicology) http://www.sibetrans.com/trans/trans12/art08.htm […] I would like to re-examine in some detail the question of the putative aesthetic propensity
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
, international trade of goods and services, advanced business services, multinational production rms and their ancillary networks, communication media, and highly skilled speciality labour. Most jobs are in fact not global, but all economies are under the in uence of the movements of their globalized core
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork
- CRYPTO 2006. LNCS,
, 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract
-
Cited by 119 (10 self)
- Add to MetaCart
model, in addition to being the first to realize fully anonymous HIBE at all levels in the hierarchy. Introduction The cryptographic primitive of identity-based encryption allows a sender to encrypt a message for a receiver using only the receiver's identity as a public key. Recently, there has
DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract
- Add to MetaCart
Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applications. In addition to labor saving, the ben-efits delivered by these advances are many and include reliable prediction of outcome, minimization of downtime, system-produced documentation, and support for archiving, historical queries, and provenance. The PRISM/PRISM++ system delivers these benefits, by solving the difficult prob-lem of automating the migration of databases and the rewrit-ing of queries and updates. In this paper, we present the PRISM/PRISM++ system and the novel technology that made it possible. In particular, we focus on the difficult and previously unsolved problem of supporting legacy queries and updates under schema and integrity constraints evolution. The PRISM/PRISM++ approach consists in providing the users with a set of SQL-based Schema Modification Opera-tors (SMOs), which describe how the tables in the old schema are modified into those in the new schema. In order to sup-port updates, SMOs are extended with integrity constraints
Visualization of Hash-functions
"... den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents ..."
Abstract
- Add to MetaCart
den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents
Special Issue Journal of the Association for Information Designing Business Models and Similar Strategic Objects: The Contribution of IS
"... In this paper, we argue that information systems (IS) research has the potential to contribute to improving strategic planning, just like it has substantially contributed to improving decision making and its support in organizations in the past. Based on our work and experience in the field of busin ..."
Abstract
- Add to MetaCart
and analysis of strategic business issues. The second area corresponds to the exploration of how design techniques and tools might contribute to improving the design of answers and alternatives to strategic business questions. The third area addresses the research in computer-aided design assisting the process
2003 Special Issue Neural networks in astronomy www.elsevier.com/locate/neunet
"... In the last decade, the use of neural networks (NN) and of other soft computing methods has begun to spread also in the astronomical community which, due to the required accuracy of the measurements, is usually reluctant to use automatic tools to perform even the most common tasks of data reduction ..."
Abstract
- Add to MetaCart
), and therefore will be structured as follows: after giving a short introduction to the subject, we shall summarize the methodological background and focus our attention on some of the most interesting fields of application, namely: object extraction and classification, time series analysis, noise identification
likelihood and the role of models in molecular phylogenetics.
- Mol. Biol. Evol.
, 2000
"... Methods such as maximum parsimony (MP) are frequently criticized as being statistically unsound and not being based on any ''model.'' On the other hand, advocates of MP claim that maximum likelihood (ML) has some fundamental problems. Here, we explore the connection between the ..."
Abstract
-
Cited by 70 (11 self)
- Add to MetaCart
, property of an estimator in most statistical settings. However this viewpoint is sometimes questioned in phylogenetics (e.g., by Nevertheless, the issue of consistency has tended to dominate much of the discussion concerning the relative merits of ML over MP, particularly since Felsenstein's (1978
Introduction to Critical Concepts: Families, Intimacies and Personal Relationships
"... Critical Concepts: Families, Intimacies and Personal Relationships 1.1 A good amount of sounding work is present in the sociological fields of family and relationship studies. This work informs the understanding and management of perceived crises in family life and anxieties around the stability of ..."
Abstract
- Add to MetaCart
of the key issues that shape the concerns of the field of study and the papers in this Special Section represent and develop http://www.socresonline.org.uk/16/4/23.html 1 02/12/2011 some of the ideas that were raised at the colloquium. Researching families, intimacies and personal relationships 2
Results 1 - 10
of
242