Sciweavers

1746 search results - page 274 / 350
» Understanding Semantic Web Applications
Sort
View
111
Voted
CHI
2010
ACM
15 years 9 months ago
A case study of micro-blogging in the enterprise: use, value, and related issues
This is a case study about the early adoption and use of micro-blogging in a Fortune 500 company. The study used several independent data sources: five months of empirical micro-b...
Jun Zhang, Yan Qu, Jane Cody, Yulingling Wu
109
Voted
ICDE
2007
IEEE
90views Database» more  ICDE 2007»
15 years 9 months ago
Music Recommendation Mapping and Interface Based on Structural Network Entropy
Recommendation systems generally produce the results of their output to their users in the form of an ordinal list. In the interest of simplicity, these lists are often obscure, ,...
Justin Donaldson
133
Voted
IWPC
1998
IEEE
15 years 6 months ago
Archetypal Source Code Searches: A Survey of Software Developers and Maintainers
In this study, we conducted a survey to generate archetypes of source code searching by programmers across maintenance tasks. Using a questionnaire on a web page, we obtained 69 r...
Susan Elliott Sim, Charles L. A. Clarke, Richard C...
108
Voted
COMPSAC
2009
IEEE
15 years 6 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
139
Voted
ISPE
2003
15 years 4 months ago
PLIB ontology for B2B electronic commerce
: Currently computers are changing from single isolated devices to entry points into a world wide network of information exchange and business transactions called the World Wide We...
Youcef Aklouf, Guy Pierra, Yamine Aït Ameur, ...