Sciweavers

1615 search results - page 286 / 323
» Dark application communities
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
WWW
2009
ACM
14 years 8 months ago
Constructing folksonomies from user-specified relations on flickr
Automatic folksonomy construction from tags has attracted much attention recently. However, inferring hierarchical relations between concepts from tags has a drawback in that it i...
Anon Plangprasopchok, Kristina Lerman
WWW
2008
ACM
14 years 8 months ago
Knowledge sharing and yahoo answers: everyone knows something
Yahoo Answers (YA) is a large and diverse question-answer forum, acting not only as a medium for sharing technical knowledge, but as a place where one can seek advice, gather opin...
Lada A. Adamic, Jun Zhang, Eytan Bakshy, Mark S. A...
WWW
2007
ACM
14 years 8 months ago
Turning portlets into services: the consumer profile
Portlets strive to play at the front end the same role that Web services currently enjoy at the back end, namely, enablers of application assembly through reusable services. Howev...
Oscar Díaz, Salvador Trujillo, Sandy P&eacu...
WWW
2004
ACM
14 years 8 months ago
Building a companion website in the semantic web
A problem facing many textbook authors (including one of the authors of this paper) is the inevitable delay between new advances in the subject area and their incorporation in a n...
Timothy Miles-Board, Christopher Bailey, Wendy Hal...