Sciweavers

CACM
2006
45views more  CACM 2006»
13 years 11 months ago
Who gets spammed?
Il-Horn Hann, Kai Lung Hui, Yee-Lin Lai, Sang-Yong...
CACM
2006
48views more  CACM 2006»
13 years 11 months ago
Enterprise transformation
William B. Rouse, Marietta L. Baba
CACM
2006
124views more  CACM 2006»
13 years 11 months ago
New architecture for intra-domain network security issues
Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schni...
CACM
2006
67views more  CACM 2006»
13 years 11 months ago
Latency and player actions in online games
Mark Claypool, Kajal T. Claypool
CACM
2006
63views more  CACM 2006»
13 years 11 months ago
Musings of an "old-school" programmer
Stephen B. Jenkins
CACM
2006
74views more  CACM 2006»
13 years 11 months ago
A research manifesto for services science
Henry Chesbrough, Jim Spohrer
CACM
2006
86views more  CACM 2006»
13 years 11 months ago
What academic research tells us about service
Roland T. Rust, Carol Miu
CACM
2006
58views more  CACM 2006»
13 years 11 months ago
What is your software worth?
This article presents a method for valuing software, based on the income that use of that software is expected to generate in the future. It applies well known principles of intel...
Gio Wiederhold