Sciweavers

3086 search results - page 519 / 618
» Developing Secure Web Applications
Sort
View
117
Voted
EEE
2004
IEEE
15 years 6 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
FASE
2006
Springer
15 years 6 months ago
A Graph-Based Approach to Transform XML Documents
Abstract. As XML diffusion keeps increasing, it is today common practice for most developers to deal with XML parsing and transformation. XML is used as format to e.g. render data,...
Gabriele Taentzer, Giovanni Toffetti Carughi
ECIR
2003
Springer
15 years 3 months ago
Evaluating Peer-to-Peer Networking for Information Retrieval within the Context of Meta-searching
Peer-to-peer (P2P) computing has shown an unexpected growth and development during the recent years. P2P networking is being applied from B2B enterprise solutions to more simple, e...
Iraklis A. Klampanos, James J. Barnes, Joemon M. J...
102
Voted
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
15 years 2 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...
114
Voted
AAMAS
2008
Springer
15 years 2 months ago
User evaluation of a market-based recommender system
Recommender systems have been developed for a wide variety of applications (ranging from books, to holidays, to web pages). These systems have used a number of different approache...
Yan Zheng Wei, Nicholas R. Jennings, Luc Moreau, W...