Sciweavers

163 search results - page 22 / 33
» An Information Systems Design Product Theory for Software Pr...
Sort
View
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 2 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
CMG
2000
13 years 8 months ago
Building Responsive and Scalable Web Applications
Responsiveness and scalability are important quality-of-service attributes for Web applications. Web sites that are slow, either because of poor responsiveness or lack of scalabil...
Connie U. Smith, Lloyd G. Williams
SIGIR
2008
ACM
13 years 7 months ago
A simple and efficient sampling method for estimating AP and NDCG
We consider the problem of large scale retrieval evaluation. Recently two methods based on random sampling were proposed as a solution to the extensive effort required to judge te...
Emine Yilmaz, Evangelos Kanoulas, Javed A. Aslam
EUROSYS
2008
ACM
14 years 4 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
CSCW
2004
ACM
14 years 24 days ago
Return on investment and organizational adoption
This paper considers the complexity of measuring the return on investment for technology adoption. A brief case study of technology adoption in a large design and construction fir...
Jonathan Grudin