Sciweavers

1044 search results - page 169 / 209
» Engineering Web Applications Using Roles
Sort
View
DBSOCIAL
2011
300views Database» more  DBSOCIAL 2011»
12 years 11 months ago
Boosting video popularity through recommendation systems
While search engines are the major sources of content discovery on online content providers and e-commerce sites, their capability is limited since textual descriptions cannot ful...
Renjie Zhou, Samamon Khemmarat, Lixin Gao, Huiqian...
GECCO
2007
Springer
211views Optimization» more  GECCO 2007»
14 years 1 months ago
Multi-objective univariate marginal distribution optimisation of mixed analogue-digital signal circuits
Design for specific customer service plays a crucial role for the majority of the market in modern electronics. However, adaptability to an individual customer results in increasi...
Lyudmila Zinchenko, Matthias Radecker, Fabio Bisog...
SIGSOFT
2007
ACM
14 years 8 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
WWW
2003
ACM
14 years 8 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams