Sciweavers

2184 search results - page 350 / 437
» Modeling and Realizing Interoperability
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
WWW
2008
ACM
14 years 8 months ago
Layman tuning of websites: facing change resilience
Client scripting permits end users to customize content, layout or style of their favourite websites. But current scripting suffers from a tight coupling with the website. If the ...
Cristóbal Arellano, Jon Iturrioz, Oscar D&i...
WWW
2008
ACM
14 years 8 months ago
Organizing the unorganized - employing IT to empower the under-privileged
Various sectors in developing countries are typically dominated by the presence of a large number of small and microbusinesses that operate in an informal, unorganized manner. Man...
Arun Kumar, Nitendra Rajput, Sheetal K. Agarwal, D...
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 8 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
CADE
2007
Springer
14 years 8 months ago
A History-based Verification of Distributed Applications
Safety and security guarantees for individual applications in general depend on assumptions on the given context provided by distributed instances of operating systems, hardware pl...
Bruno Langenstein, Andreas Nonnengart, Georg Rock,...