Sciweavers

6844 search results - page 1291 / 1369
» Web Service Security
Sort
View
117
Voted
DATESO
2010
96views Database» more  DATESO 2010»
15 years 17 days ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
138
Voted
ECAI
2010
Springer
15 years 17 days ago
Social Recommendation with Interpersonal Influence
Social recommendation, that an individual recommends an item to another, has gained popularity and success in web applications such as online sharing and shopping services. It is l...
Junming Huang, Xueqi Cheng, Jiafeng Guo, Huawei Sh...
133
Voted
P2P
2010
IEEE
127views Communications» more  P2P 2010»
15 years 14 days ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
142
Voted
SEMWEB
2010
Springer
15 years 13 days ago
Making Sense of Twitter
Abstract. Twitter enjoys enormous popularity as a micro-blogging service largely due to its simplicity. On the downside, there is little organization to the Twitterverse and making...
David Laniado, Peter Mika
SIGSOFT
2010
ACM
15 years 13 days ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
« Prev « First page 1291 / 1369 Last » Next »