04-17-2005, 06:48 AM
In case you didn't see this in slashdot:
Story:
http://www.cnn.com/2005/TECH/science/04/...rank.reut/
Commentary:
http://duhblog.com/space/start/2005-04-15/1
Slashdot not linked as their commentary was one paragraph
The 'conference site:
http://www.iiisci.org/sci2005/website/default.asp
The auto generator site:
http://www.pdos.lcs.mit.edu/scigen/
Try some of the autogeneration, it is very well done :P
" We now consider existing work. Bose and Harris [7,12,24] and Sasaki and Jackson [21] presented the first known instance of autonomous modalities. Similarly, Q. Qian developed a similar system, nevertheless we verified that our framework is optimal [11,26,23]. On the other hand, these methods are entirely orthogonal to our efforts.
A major source of our inspiration is early work by Sun [3] on embedded algorithms. This solution is less flimsy than ours. Juris Hartmanis et al. described several cacheable approaches, and reported that they have profound influence on peer-to-peer configurations [10,13,13]. Thus, the class of heuristics enabled by our methodology is fundamentally different from previous solutions [8].
"
Story:
http://www.cnn.com/2005/TECH/science/04/...rank.reut/
Commentary:
http://duhblog.com/space/start/2005-04-15/1
Slashdot not linked as their commentary was one paragraph
The 'conference site:
http://www.iiisci.org/sci2005/website/default.asp
The auto generator site:
http://www.pdos.lcs.mit.edu/scigen/
Try some of the autogeneration, it is very well done :P
" We now consider existing work. Bose and Harris [7,12,24] and Sasaki and Jackson [21] presented the first known instance of autonomous modalities. Similarly, Q. Qian developed a similar system, nevertheless we verified that our framework is optimal [11,26,23]. On the other hand, these methods are entirely orthogonal to our efforts.
A major source of our inspiration is early work by Sun [3] on embedded algorithms. This solution is less flimsy than ours. Juris Hartmanis et al. described several cacheable approaches, and reported that they have profound influence on peer-to-peer configurations [10,13,13]. Thus, the class of heuristics enabled by our methodology is fundamentally different from previous solutions [8].
"