Sciweavers

1659 search results - page 296 / 332
» Modeling Customizable Web Applications
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
DEXA
2009
Springer
120views Database» more  DEXA 2009»
15 years 4 months ago
Supporting Personal Semantic Annotations in P2P Semantic Wikis
In this paper, we propose to extend Peer-to-Peer Semantic Wikis with personal semantic annotations. Semantic Wikis are one of the most successful Semantic Web applications. In sema...
Diego Torres, Hala Skaf-Molli, Alicia Díaz,...
ISAAC
2009
Springer
175views Algorithms» more  ISAAC 2009»
15 years 4 months ago
Worst-Case and Smoothed Analysis of k-Means Clustering with Bregman Divergences
The k-means algorithm is the method of choice for clustering large-scale data sets and it performs exceedingly well in practice. Most of the theoretical work is restricted to the c...
Bodo Manthey, Heiko Röglin
OOPSLA
2009
Springer
15 years 4 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
77
Voted
SEMWEB
2009
Springer
15 years 4 months ago
Reasoning in Metamodeling Enabled Ontologies
Ontologies are expected to play an important role in many application domains, as well as in software engineering in general. One problem with using ontologies within software engi...
Nophadol Jekjantuk, Gerd Gröner, Jeff Z. Pan