David Thompson, Oliver Kamm, Justin Pettis, Gerald Simons, Clement Rohee, Stephany Griffith-Jones,
... out in South Korea Vodafone Commerzbank Wish fulfilment Linux loot Software Nokia Timken Who needs NTT? Japanese ...
1999 - Gale Group | The Economist
... the French and British implementations, International Journal of Foresight and Innovation Policy 6, no.44 (Jan 2010): ... 02)00136-4Mikko Mustonen Copyleft—the economics of Linux and other open source software, Information Economics and ...
Tópico(s): Firm Innovation and Growth
1985 - University of Chicago Press | Journal of Political Economy
... Symposium that year published 19 papers that showed foresight and practical relevance in varying degrees.Two papers on denial of service provided important mitigation approaches for a relatively new research area.Both papers provided new techniques.In "Defending Against Denial-of-Service Attacks With Puzzle Auctions," Wang and Reiter 1 proposed the use of client puzzles with the addition of auctions and demonstrated this in Linux.This work is notable because, while puzzle solving ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2023 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy
Jochen Schanze, Verena Maleska,
... HPC) facility such as the so-called Simple Linux Utility for Resource Management (SLURM). Furthermore, auto-calibration ...
Tópico(s): Hydrology and Watershed Management Studies
2019 - Wiley | Journal of Flood Risk Management
Raúl Trujillo-Cabezas, José Luís Verdegay,
... presented here has been developed in an Amazon Linux 2 AMI instance, and Shiny and RStudio were used for its development. An operational version that can be used for academic and/or professional purposes will be available at the URLs www.meta-foresight.org and www.lametaprospective.org by the end ...
Tópico(s): Cloud Computing and Resource Management
2019 - Springer Nature | Studies in fuzziness and soft computing
... happen. Security thus depends a lot on the foresight and strategies of the administrator.
Tópico(s): Advanced Malware Detection Techniques
2006 - Taylor & Francis | Information Systems Security