Sciweavers

3330 search results - page 432 / 666
» software 2010
Sort
View
116
Voted
CORR
2010
Springer
268views Education» more  CORR 2010»
15 years 5 months ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
IAJIT
2010
162views more  IAJIT 2010»
15 years 3 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...
132
Voted
IEEECIT
2010
IEEE
15 years 3 months ago
Research on Mobile Web Application Phone Simulator
Phone simulator is a simulation tool running on PC which can test debug phone software. It also provides front graphical user interface (GUI) like the true phone’s LCD. Develope...
Ziqiong Wang, Yanhong Peng, Lei Luo
IV
2010
IEEE
140views Visualization» more  IV 2010»
15 years 3 months ago
GVIS: An Integrating Infrastructure for Adaptively Mashing up User Data from Different Sources
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...
Luca Mazzola, Riccardo Mazza
JNCA
2010
106views more  JNCA 2010»
15 years 3 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...