1,491,403 research outputs found
Grosch's law: a statistical illusion?.
In this paper a central law on economies of scale in computer hardware pricing, Grosch's law is discussed. The history and various validation efforts are examined in detail. It is shown how the last set of validations during the eighties may be interpreted as a statistical misinterpretation, although this effect may have been present in all validation attempts, including the earliest ones. Simulation experiments reveal that constant returns to scale in combination with decreasing computer prices may give the illusion of Grosch's law when performing regression models against computer prices over many years. The paper also shows how the appropriate definition of computer capacity, and in particular Kleinrock's power definition, plays a central role in economies of scale for computer prices.Law;
Computer Technology for the Benefit of the Rule of Law: Communication and Research
This Essay suggests a number of ways in which rule of law partners in the United States and abroad with modest technical background might more easily communicate, plan, coordinate, and research joint projects. Without the new computer technologies it would be very difficult to conduct rule of law projects between partners in the United States and Russia. Recent advances in technologies now make communication with colleagues across the world by computer easier than ever
Copyrights in Computer-Generated Works: Whom, if Anyone, Do We Reward?
Computer-generated works raise grave authorship concerns under U.S. copyright law, with arguments in favor of allocating copyrights to the computer user, programmer, the computer itself, or some combination therein. The author discusses the issues and paradoxes inherent in these choices, and assesses the nature of mathematical graphical processes in light of the idea/expression dichotomy
Coddling Spies: Why the Law Doesn’t Adequately Address Computer Spyware
Consumers and businesses have attempted to use the common law of torts as well as federal statutes like the Computer Fraud and Abuse Act, the Stored Wire and Electronic Communications and Transactional Records Act, and the Wiretap Act to address the expanding problem of spyware. Spyware, which consists of software applications inserted into another\u27s computer to report a user\u27s activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual\u27s identity. Existing law does not address spyware adequately because authorization language, buried in click-through boilerplate, renders much of current law useless. Congress must act to make spyware companies disclose their intentions with conspicuous and clearly-stated warnings
Recommended from our members
The Law Commission presumption concerning the dependability of computer evidence
We consider the condition set out in section 69(1)(b) of the Police and Criminal Evidence Act 1984 (PACE 1984) that reliance on computer evidence should be subject to proof of its correctness, and compare it to the 1997 Law Commission recommendation that acommon law presumption be used that a computer operated correctly unless there is explicit evidence to the contrary (LC Presumption). We understand the LC Presumption prevails in current legal proceedings. We demonstrate that neither section 69(1)(b) of PACE 1984 nor the LC presumption reflects the reality of general software-based system behaviour
The skewness of computer science
Computer science is a relatively young discipline combining science,
engineering, and mathematics. The main flavors of computer science research
involve the theoretical development of conceptual models for the different
aspects of computing and the more applicative building of software artifacts
and assessment of their properties. In the computer science publication
culture, conferences are an important vehicle to quickly move ideas, and
journals often publish deeper versions of papers already presented at
conferences. These peculiarities of the discipline make computer science an
original research field within the sciences, and, therefore, the assessment of
classical bibliometric laws is particularly important for this field. In this
paper, we study the skewness of the distribution of citations to papers
published in computer science publication venues (journals and conferences). We
find that the skewness in the distribution of mean citedness of different
venues combines with the asymmetry in citedness of articles in each venue,
resulting in a highly asymmetric citation distribution with a power law tail.
Furthermore, the skewness of conference publications is more pronounced than
the asymmetry of journal papers. Finally, the impact of journal papers, as
measured with bibliometric indicators, largely dominates that of proceeding
papers.Comment: I applied the goodness-of-fit methodology proposed in: A. Clauset, C.
R. Shalizi, M. E. J. Newman. Power-law distributions in empirical data. SIAM
Review 51, 661-703 (2009
A critical look at power law modelling of the Internet
This paper takes a critical look at the usefulness of power law models of the
Internet. The twin focuses of the paper are Internet traffic and topology
generation. The aim of the paper is twofold. Firstly it summarises the state of
the art in power law modelling particularly giving attention to existing open
research questions. Secondly it provides insight into the failings of such
models and where progress needs to be made for power law research to feed
through to actual improvements in network performance.Comment: To appear Computer Communication
Is I-Voting I-Llegal?
The Voting Rights Act was passed to prevent racial discrimination in all voting booths. Does the existence of a racial digital divide make Internet elections for public office merely a computer geek\u27s pipe dream? Or can i-voting withstand scrutiny under the current state of the law? This i-Brief will consider the current state of the law, and whether disproportionate benefits will be enough to stop this extension of technology dead in its tracks
- …