Sciweavers

26354 search results - page 34 / 5271
» How we refactor, and how we know it
Sort
View
CIKM
2007
Springer
14 years 1 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
SWAP
2007
13 years 9 months ago
Who the FOAF knows Alice? RDF Revocation in DBin 2.0
In this paper we take a view from the bottom to RDF(S) reasoning. We discuss some issues and requirements on reasoning towards effectively building Semantic Web Pipes, aggregating ...
Christian Morbidoni, Axel Polleres, Giovanni Tumma...
GI
2005
Springer
14 years 1 months ago
Trust and quality in electronic communication: Getting to know your customers bit by bit
: A client was experiencing trust and information quality problems in his structured Internet communication with potential and existing customers. Customer information entered onli...
Andreas Neus, Philipp Scherf, Christian Gebert
SEMWEB
2007
Springer
14 years 1 months ago
Who the FOAF knows Alice? A Needed Step Toward Semantic Web Pipes
In this paper we take a view from the bottom to RDF(S) reasoning. We discuss some issues and requirements on reasoning towards effectively building Semantic Web Pipes, aggregating...
Christian Morbidoni, Axel Polleres, Giovanni Tumma...
IWPC
2006
IEEE
14 years 1 months ago
Digging the Development Dust for Refactorings
Software repositories are rich sources of information about the software development process. Mining the information stored in them has been shown to provide interesting insights ...
Curtis Schofield, Brendan Tansey, Zhenchang Xing, ...