Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2020
Public opinion matters: mining social media text for environmental management
ACM SIGWEB Newsletter (SIGWEB), Volume 2019, Issue AutumnArticle No.: 5, Pages 1–15https://doi.org/10.1145/3352683.3352688Social media mining has proven useful in multiple research fields as a tool for public opinion extraction and analysis. Such mining can discover knowledge from unstructured data in booming social media sources that provide instant public responses and ...
- bookJanuary 2018
Cyber Crime and Cyber Terrorism (4th Edition)
For courses in computer crime. A complete, easy-to-understand introduction to computer crime Cyber Crime and Cyber Terrorism is a comprehensive introduction to the acts and theories of cyber crime, cyber terrorism, and information warfare. Assuming no ...
- bookMarch 2014
Digital Crime and Digital Terrorism
This text uses a conversational tone to the writing designed to convey complex technical issues as understandable concepts. Digital Crime and Digital Terrorism, 3e, is written in a user-friendly fashion, designed to be understandable by even the most ...
- ArticleJuly 2005
New Generation Scalable and Dependable Servers
NCA '05: Proceedings of the Fourth IEEE International Symposium on Network Computing and ApplicationsPage 8https://doi.org/10.1109/NCA.2005.36Today s applications are being built in new ways. The advent of service-oriented architectures, modern networking protocols and industry-standard components at all levels open seemingly endless possibilities for new applications and services. But these ...
- research-articleJanuary 2003
Open and close a file
Encyclopedia of Computer ScienceJanuary 2003, Pages 1287–1288A file is considered open when it may be accessed for reading, writing, or possibly both. It is considered closed when it cannot be so accessed. An open routine changes the state of a file from closed to open; a close routine does the opposite.
- research-articleJanuary 2003
Logical and physical names
Encyclopedia of Computer ScienceJanuary 2003, Pages 1031–1032A physical (input-output) unit is an input-output device and its associated recording medium. Thus, tape drives, disk drives, drums, keyboards, and printers are all examples of physical units. A logical unit is a convenient abstraction of a physical ...
- research-articleJanuary 2003
Input-output control system (IOCS)
Encyclopedia of Computer ScienceJanuary 2003, Pages 870–874One of the earliest and most fundamental reasons for the initial development and subsequent growth of operating systems concerns the handling of input-output (I/O) operations. The transfer of responsibility for I/O operations from the programmer to the ...
- research-articleJanuary 2003
Buffer
Encyclopedia of Computer ScienceJanuary 2003, Pages 160–161A buffer is an area of storage that temporarily holds data that will be subsequently delivered to a processor or input-output (I/O) peripheral. Buffers exist as an integral part of many peripherals, e.g. bits arriving serially over a telephone line are ...
- research-articleJanuary 1974
When are pointer arrays better than chains
ACM '74: Proceedings of the 1974 annual ACM conference - Volume 2Page 735https://doi.org/10.1145/1408800.1408900The DBTG [1] introduced two modes of set implementation--chain and pointer array. To review briefly, a set occurrence is an occurrence of the (unique) set owner along with zero or more occurrences of each of the set members. The mode of a set indicates ...