Sciweavers

249 search results - page 44 / 50
» Security of open source web applications
Sort
View
ESE
2008
112views Database» more  ESE 2008»
13 years 9 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
CONCURRENCY
2007
98views more  CONCURRENCY 2007»
13 years 9 months ago
Portal-based Knowledge Environment for Collaborative Science
The Knowledge Environment for Collaborative Science (KnECS) is an open source informatics toolkit designed to enable knowledge grids that interconnect science communities, unique ...
Karen Schuchardt, Carmen M. Pancerella, Larry A. R...
HICSS
2011
IEEE
264views Biometrics» more  HICSS 2011»
13 years 1 months ago
The Kukui Cup: A Dorm Energy Competition Focused on Sustainable Behavior Change and Energy Literacy
Abstract—The Kukui Cup is an advanced dorm energy competition whose goal is to investigate the relationships among energy literacy, sustained energy conservation, and information...
Robert S. Brewer, George E. Lee, Philip M. Johnson
SIGIR
2009
ACM
14 years 4 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
WMASH
2003
ACM
14 years 3 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...