Sciweavers

3086 search results - page 519 / 618
» Developing Secure Web Applications
Sort
View
EEE
2004
IEEE
14 years 26 days ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
FASE
2006
Springer
14 years 24 days ago
A Graph-Based Approach to Transform XML Documents
Abstract. As XML diffusion keeps increasing, it is today common practice for most developers to deal with XML parsing and transformation. XML is used as format to e.g. render data,...
Gabriele Taentzer, Giovanni Toffetti Carughi
ECIR
2003
Springer
13 years 10 months ago
Evaluating Peer-to-Peer Networking for Information Retrieval within the Context of Meta-searching
Peer-to-peer (P2P) computing has shown an unexpected growth and development during the recent years. P2P networking is being applied from B2B enterprise solutions to more simple, e...
Iraklis A. Klampanos, James J. Barnes, Joemon M. J...
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
13 years 9 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...
AAMAS
2008
Springer
13 years 9 months ago
User evaluation of a market-based recommender system
Recommender systems have been developed for a wide variety of applications (ranging from books, to holidays, to web pages). These systems have used a number of different approache...
Yan Zheng Wei, Nicholas R. Jennings, Luc Moreau, W...