Sciweavers

1897 search results - page 133 / 380
» Early application identification
Sort
View
148
Voted
WWW
2005
ACM
16 years 5 months ago
The semantic webscape: a view of the semantic web
It has been a few years since the semantic Web was initiated by W3C, but its status has not been quantitatively measured. It is crucial to understand the status at this early stag...
Juhnyoung Lee, Richard Goodwin
133
Voted
ICSE
2003
IEEE-ACM
16 years 4 months ago
Pattern Oriented Software Development: Moving Seamlessly from Requirements to Architecture
Requirements Engineering (RE) deals with the early phases of software engineering namely requirement elicitation, modeling, specification and validation. Architecture of a softwar...
M. S. Rajasree, P. Jithendra Kumar Reddy, D. Janak...
122
Voted
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
15 years 10 months ago
A Peer-to-Peer Architecture to Enable Versatile Lookup System Design
The resource lookup requirements in applications such as web caching, web content search, content distribution, resource sharing, network monitoring and management, and e-commerce...
Vivek Sawant, Jasleen Kaur
OOPSLA
2004
Springer
15 years 10 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
190
Voted
AP2PS
2009
IEEE
15 years 11 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...