Sciweavers

883 search results - page 160 / 177
» Communities of Interest
Sort
View
IISWC
2008
IEEE
14 years 2 months ago
Workload characterization of selected JEE-based Web 2.0 applications
Web 2.0 represents the evolution of the web from a source of information to a platform. Network advances have permitted users to migrate from desktop applications to so-called Ric...
Priya Nagpurkar, William Horn, U. Gopalakrishnan, ...
TRIDENTCOM
2008
IEEE
14 years 2 months ago
Performance analysis of a lightweight NEMO implementation for low-end devices
IETF Network Mobility (NEMO) Basic Support Protocol is an IP mobility management protocol designed to provide seamless IP mobility to complete networks. This protocol is of crucia...
J. L. Almodovar, Antonio de la Oliva, C. Lazo Ram,...
WCRE
2008
IEEE
14 years 2 months ago
FAMOOSr 2008: Workshop on FAMIX and Moose in Software Reengineering
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this con...
Stéphane Ducasse, Tudor Gîrba, Orla G...
GCB
2007
Springer
134views Biometrics» more  GCB 2007»
14 years 1 months ago
An Application of Latent Topic Document Analysis to Large-Scale Proteomics Databases
Since the advent of public data repositories for proteomics data, readily accessible results from high-throughput experiments have been accumulating steadily. Several large-scale p...
Sebastian Klie, Lennart Martens, Juan Antonio Vizc...
ICISS
2007
Springer
14 years 1 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash