Sciweavers

4320 search results - page 808 / 864
» Identity management architecture
Sort
View
SIGSOFT
2004
ACM
14 years 9 months ago
How a good software practice thwarts collaboration: the multiple roles of APIs in software development
The principle of information hiding has been very influential in software engineering since its inception in 1972. This principle prescribes that software modules hide implementat...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
SIGSOFT
2003
ACM
14 years 9 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg
WWW
2008
ACM
14 years 9 months ago
Sewnet -: a framework for creating services utilizing telecom functionality
With Telecom market reaching saturation in many geographies and revenues from voice calls decreasing, Telecom operators are trying to identify new sources of revenue. For this pur...
Sumit Mittal, Dipanjan Chakraborty, Sunil Goyal, S...
WWW
2006
ACM
14 years 9 months ago
POLYPHONET: an advanced social network extraction system from the web
Social networks play important roles in the Semantic Web: knowledge management, information retrieval, ubiquitous computing, and so on. We propose a social network extraction syst...
Hideaki Takeda, Junichiro Mori, Kôiti Hasida...
WWW
2005
ACM
14 years 9 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani