Sciweavers

350 search results - page 36 / 70
» What's in a Name
Sort
View
CHI
2005
ACM
14 years 10 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
ICSE
2005
IEEE-ACM
14 years 10 months ago
Informatics: A Novel, Contextualized Approach to Software Engineering Education
Over the past decade, it has been established that a good education in software engineering requires a specialized program of study different from traditional computer science prog...
André van der Hoek, David G. Kay, Debra J. ...
ICDE
2010
IEEE
212views Database» more  ICDE 2010»
14 years 9 months ago
ViewJoin: Efficient View-based Evaluation of Tree Pattern Queries
A fundamental problem in XML query processing is tree pattern query (TPQ) matching which computes all data instances in an XML database that match an input TPQ. There is a lot of r...
Ding Chen, Chee-Yong Chan
PAM
2010
Springer
14 years 4 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 4 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...