Jump to: navigation, search

Risultato della ricerca

  • .... Experiments were carried in a 100,000-pages synthetic graph with a power-law distribution of in-links. However, there was no comparison with other strat ...ocused crawling: a new approach to topic-specific web resource discovery]. Computer Networks, 31(11–16):1623–1640.</ref>.
    40 KB (6 274 parole) - 15:24, 26 Gen 2009
  • ...same copyleft. Under this philosophy, the GPL grants the recipients of a [[computer program]] the rights of the [[The Free Software Definition|free software de ...License, except that it additionally covers the use of the software over a computer network, requiring that the complete source code be made available to any n
    44 KB (6 679 parole) - 07:30, 8 Lug 2009
  • ...lished.[3] On November 29, 2007, Stefan Berteau, a security researcher for Computer Associates, published a note on his tests of the Beacon system, and found t ...California Consumer Legal Remedies Act, and the California Computer Crime Law.[10][11]
    5 KB (804 parole) - 05:35, 29 Apr 2010
  • *svolge funzioni critiche in molti [[computer]], apparecchi per telecomunicazioni, motori jet e numerose applicazioni ind ...ency, and to establish a non-debt-backed currency in accord with [[Islamic law]] against the charging of interest. [http://www.islamidag.dk/ulamaongold.ht
    30 KB (4 263 parole) - 03:15, 2 Mag 2008