1,491,403 research outputs found

    Grosch's law: a statistical illusion?.

    Get PDF
    In this paper a central law on economies of scale in computer hardware pricing, Grosch's law is discussed. The history and various validation efforts are examined in detail. It is shown how the last set of validations during the eighties may be interpreted as a statistical misinterpretation, although this effect may have been present in all validation attempts, including the earliest ones. Simulation experiments reveal that constant returns to scale in combination with decreasing computer prices may give the illusion of Grosch's law when performing regression models against computer prices over many years. The paper also shows how the appropriate definition of computer capacity, and in particular Kleinrock's power definition, plays a central role in economies of scale for computer prices.Law;

    Computer Technology for the Benefit of the Rule of Law: Communication and Research

    Get PDF
    This Essay suggests a number of ways in which rule of law partners in the United States and abroad with modest technical background might more easily communicate, plan, coordinate, and research joint projects. Without the new computer technologies it would be very difficult to conduct rule of law projects between partners in the United States and Russia. Recent advances in technologies now make communication with colleagues across the world by computer easier than ever

    Copyrights in Computer-Generated Works: Whom, if Anyone, Do We Reward?

    Get PDF
    Computer-generated works raise grave authorship concerns under U.S. copyright law, with arguments in favor of allocating copyrights to the computer user, programmer, the computer itself, or some combination therein. The author discusses the issues and paradoxes inherent in these choices, and assesses the nature of mathematical graphical processes in light of the idea/expression dichotomy

    Coddling Spies: Why the Law Doesn’t Adequately Address Computer Spyware

    Get PDF
    Consumers and businesses have attempted to use the common law of torts as well as federal statutes like the Computer Fraud and Abuse Act, the Stored Wire and Electronic Communications and Transactional Records Act, and the Wiretap Act to address the expanding problem of spyware. Spyware, which consists of software applications inserted into another\u27s computer to report a user\u27s activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual\u27s identity. Existing law does not address spyware adequately because authorization language, buried in click-through boilerplate, renders much of current law useless. Congress must act to make spyware companies disclose their intentions with conspicuous and clearly-stated warnings

    The skewness of computer science

    Full text link
    Computer science is a relatively young discipline combining science, engineering, and mathematics. The main flavors of computer science research involve the theoretical development of conceptual models for the different aspects of computing and the more applicative building of software artifacts and assessment of their properties. In the computer science publication culture, conferences are an important vehicle to quickly move ideas, and journals often publish deeper versions of papers already presented at conferences. These peculiarities of the discipline make computer science an original research field within the sciences, and, therefore, the assessment of classical bibliometric laws is particularly important for this field. In this paper, we study the skewness of the distribution of citations to papers published in computer science publication venues (journals and conferences). We find that the skewness in the distribution of mean citedness of different venues combines with the asymmetry in citedness of articles in each venue, resulting in a highly asymmetric citation distribution with a power law tail. Furthermore, the skewness of conference publications is more pronounced than the asymmetry of journal papers. Finally, the impact of journal papers, as measured with bibliometric indicators, largely dominates that of proceeding papers.Comment: I applied the goodness-of-fit methodology proposed in: A. Clauset, C. R. Shalizi, M. E. J. Newman. Power-law distributions in empirical data. SIAM Review 51, 661-703 (2009

    A critical look at power law modelling of the Internet

    Get PDF
    This paper takes a critical look at the usefulness of power law models of the Internet. The twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is twofold. Firstly it summarises the state of the art in power law modelling particularly giving attention to existing open research questions. Secondly it provides insight into the failings of such models and where progress needs to be made for power law research to feed through to actual improvements in network performance.Comment: To appear Computer Communication

    Is I-Voting I-Llegal?

    Get PDF
    The Voting Rights Act was passed to prevent racial discrimination in all voting booths. Does the existence of a racial digital divide make Internet elections for public office merely a computer geek\u27s pipe dream? Or can i-voting withstand scrutiny under the current state of the law? This i-Brief will consider the current state of the law, and whether disproportionate benefits will be enough to stop this extension of technology dead in its tracks
    • …
    corecore