Sciweavers

CACM
2006
45views more  CACM 2006»
13 years 4 months ago
Who gets spammed?
Il-Horn Hann, Kai Lung Hui, Yee-Lin Lai, Sang-Yong...
CACM
2006
48views more  CACM 2006»
13 years 4 months ago
Enterprise transformation
William B. Rouse, Marietta L. Baba
CACM
2006
124views more  CACM 2006»
13 years 4 months ago
New architecture for intra-domain network security issues
Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schni...
CACM
2006
67views more  CACM 2006»
13 years 4 months ago
Latency and player actions in online games
Mark Claypool, Kajal T. Claypool
CACM
2006
63views more  CACM 2006»
13 years 4 months ago
Musings of an "old-school" programmer
Stephen B. Jenkins
CACM
2006
74views more  CACM 2006»
13 years 4 months ago
A research manifesto for services science
Henry Chesbrough, Jim Spohrer
CACM
2006
58views more  CACM 2006»
13 years 4 months ago
What is your software worth?
This article presents a method for valuing software, based on the income that use of that software is expected to generate in the future. It applies well known principles of intel...
Gio Wiederhold