Sciweavers

2747 search results - page 139 / 550
» Network externalities in software systems
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 2 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
USS
2008
13 years 11 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
KBSE
2009
IEEE
14 years 3 months ago
Cache-Based Model Checking of Networked Applications: From Linear to Branching Time
Abstract—Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such sys...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
POLICY
2007
Springer
14 years 3 months ago
Adaptive Web Data Extraction Policies
Web data extraction is concerned, among other things, with routine data accessing and downloading from continuously-updated dynamic Web pages. There is a relevant trade-off between...
Giacomo Fiumara, Massimo Marchi, Alessandro Provet...
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
14 years 2 months ago
Community Collective Efficacy: Structure and Consequences of Perceived Capacities in the Blacksburg Electronic Village
Bandura’s social cognitive construct “perceived selfefficacy” has been used widely to understand individual behavior as a function of domain-specific beliefs about personal ...
John M. Carroll, Debbie Denise Reese