Sciweavers

CACM
2008
61views more  CACM 2008»
13 years 11 months ago
In search of dependable design
Leah Hoffman
CACM
2008
84views more  CACM 2008»
13 years 11 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
CACM
2008
96views more  CACM 2008»
13 years 11 months ago
The provenance of electronic data
In the study of fine art, provenance refers to the documented history of some art object. Given that documented history, the object attains an authority that allows scholars to ap...
Luc Moreau, Paul T. Groth, Simon Miles, Javier V&a...
CACM
2008
75views more  CACM 2008»
13 years 11 months ago
Web science: an interdisciplinary approach to understanding the web
James A. Hendler, Nigel Shadbolt, Wendy Hall, Tim ...
CACM
2008
84views more  CACM 2008»
13 years 11 months ago
Taming heterogeneous agent architectures
argely on the ability of used architectural abstractions to support the separate handling of agent-specific concerns since an early state of design. The applied architectural style...
Alessandro Garcia, Carlos José Pereira de L...
CACM
2008
48views more  CACM 2008»
13 years 11 months ago
Information security and risk management
Lawrence D. Bodin, Lawrence A. Gordon, Martin P. L...
CACM
2008
79views more  CACM 2008»
13 years 11 months ago
BRAP forensics
Hal Berghel
CACM
2008
57views more  CACM 2008»
13 years 11 months ago
Geometry, flows, and graph-partitioning algorithms
Sanjeev Arora, Satish Rao, Umesh V. Vazirani
CACM
2008
44views more  CACM 2008»
13 years 11 months ago
Getting to "we"
Peter J. Denning, Peter Yaholkovsky