Sciweavers

6844 search results - page 1291 / 1369
» Web Service Security
Sort
View
DATESO
2010
96views Database» more  DATESO 2010»
13 years 7 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
ECAI
2010
Springer
13 years 7 months ago
Social Recommendation with Interpersonal Influence
Social recommendation, that an individual recommends an item to another, has gained popularity and success in web applications such as online sharing and shopping services. It is l...
Junming Huang, Xueqi Cheng, Jiafeng Guo, Huawei Sh...
P2P
2010
IEEE
127views Communications» more  P2P 2010»
13 years 6 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
SEMWEB
2010
Springer
13 years 6 months ago
Making Sense of Twitter
Abstract. Twitter enjoys enormous popularity as a micro-blogging service largely due to its simplicity. On the downside, there is little organization to the Twitterverse and making...
David Laniado, Peter Mika
SIGSOFT
2010
ACM
13 years 6 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
« Prev « First page 1291 / 1369 Last » Next »