Sciweavers

8636 search results - page 94 / 1728
» How Developers Copy
Sort
View
DRM
2003
Springer
15 years 3 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
IMC
2010
ACM
14 years 7 months ago
YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspective
In this paper we conduct an extensive and in-depth study of traffic exchanged between YouTube data centers and its users, as seen from the perspective of a tier-1 ISP in Spring 20...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
SIGCSE
2008
ACM
93views Education» more  SIGCSE 2008»
14 years 9 months ago
Struggles of new college graduates in their first software development job
How do new college graduates experience their first software development jobs? In what ways are they prepared by their educational experiences, and in what ways do they struggle t...
Andrew Begel, Beth Simon
ECSCW
2001
14 years 11 months ago
Supporting distributed software development by modes of collaboration
Work processes in team based software development need to be structured to minimise and resolve conflicting or divergent work. Current software development methodologies propose wa...
Till Schümmer, Jörg M. Haake
ITP
2008
117views Mathematics» more  ITP 2008»
14 years 10 months ago
Mobilization of software developers: the free software movement
Free/open source software (F/OSS) development projects are growing at a rapid rate. Globally dispersed virtual communities with large groups of software developers contribute time...
Margaret S. Elliott, Walt Scacchi