Sciweavers

275 search results - page 45 / 55
» An Investigation of Cloning in Web Applications
Sort
View
CCS
2007
ACM
13 years 11 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
ICSE
2000
IEEE-ACM
13 years 11 months ago
A case study of open source software development: the Apache server
According to its proponents, open source style software development has the capacity to compete successfully, and perhaps in many cases displace, traditional commercial developmen...
Audris Mockus, Roy T. Fielding, James D. Herbsleb
ASWC
2008
Springer
13 years 9 months ago
Bounded Ontological Consistency for Scalable Dynamic Knowledge Infrastructures
Both semantic web applications and individuals are in need of knowledge infrastructures that can be used in dynamic and distributed environments where different autonomous entities...
Maciej Zurawski, Alan Smaill, Dave Robertson
CIKM
2008
Springer
13 years 9 months ago
A metric cache for similarity search
Similarity search in metric spaces is a general paradigm that can be used in several application fields. It can also be effectively exploited in content-based image retrieval syst...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
SDM
2008
SIAM
164views Data Mining» more  SDM 2008»
13 years 8 months ago
Randomizing Social Networks: a Spectrum Preserving Approach
Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. The nodes in the network are the individuals and...
Xiaowei Ying, Xintao Wu