-
1
-
-
77957782809
-
-
Juniper Research, Mobile Content and Applications, May
-
I. Chard, "Mobile Web 2.0 - Leveraging 'Location, IM, Social Web & Search' 2008-2013", Juniper Research, Mobile Content and Applications, May 2008.
-
(2008)
Mobile Web 2.0 - Leveraging 'Location, IM, Social Web & Search' 2008-2013
-
-
Chard, I.1
-
2
-
-
84856164994
-
-
WeFi, http://www.wefi.com.
-
-
-
-
3
-
-
79959605522
-
Multi-Tier Architectures
-
Editors-in-chief: Özsu, M. Tamer; Liu, Ling, Springer
-
Heiko Schuldt, "Multi-Tier Architectures," Encyclopedia of Database Systems, Editors-in-chief: Özsu, M. Tamer; Liu, Ling, Springer, 2009.
-
(2009)
Encyclopedia of Database Systems
-
-
Schuldt, H.1
-
5
-
-
77954753828
-
Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload
-
ACM, New York, NY, USA
-
Simon Malkowski, Deepal Jayasinghe, Markus Hedwig, Junhee Park, Yasuhiko Kanemasa, and Calton Pu. 2010. Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload. In Proceedings of the 2010 ACM Symposium on Applied Computing (SAC '10). ACM, New York, NY, USA, 1680-1687.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC '10)
, pp. 1680-1687
-
-
Malkowski, S.1
Jayasinghe, D.2
Hedwig, M.3
Park, J.4
Kanemasa, Y.5
Pu, C.6
-
6
-
-
84870633505
-
-
Android SDK, http://developer.android.com/sdk/index.html.
-
Android SDK
-
-
-
7
-
-
84856149212
-
-
Apache Tomcat, http://tomcat.apache.org.
-
-
-
-
8
-
-
84856196243
-
-
Axis2, http://axis.apache.org/axis2/java/core/.
-
Axis2
-
-
-
9
-
-
84856905209
-
-
Bouncy Castle, http://www.bouncycastle.org/java.html.
-
Bouncy Castle
-
-
-
10
-
-
84856202488
-
-
DBPool, http://www.snaq.net/java/DBPool.
-
DBPool
-
-
-
11
-
-
84856149213
-
-
RestFb, http://www.restfb.com/.
-
-
-
-
13
-
-
77953576532
-
Using probabilistic confidence models for trust inference in Web-based social networks
-
Ugur Kuter and Jennifer Golbeck. Article 8 June 2010
-
Ugur Kuter and Jennifer Golbeck. 2010. Using probabilistic confidence models for trust inference in Web-based social networks. ACM Trans. Internet Technol. 10, 2, Article 8 (June 2010).
-
(2010)
ACM Trans. Internet Technol.
, vol.10
, Issue.2
-
-
-
14
-
-
50249123219
-
Towards a Model for Inferring Trust in Heterogeneous Social Networks
-
IEEE Computer Society, Washington, DC, USA
-
Masoud Akhoondi, Jafar Habibi, and Mohsen Sayyadi. 2008. Towards a Model for Inferring Trust in Heterogeneous Social Networks. In Proceedings of the 2008 Second Asia International Conference on Modelling \& Simulation (AMS) (AMS '08). IEEE Computer Society, Washington, DC, USA, 52-58.
-
(2008)
Proceedings of the 2008 Second Asia International Conference on Modelling \& Simulation (AMS) (AMS '08)
, pp. 52-58
-
-
Akhoondi, M.1
Habibi, J.2
Sayyadi, M.3
-
15
-
-
70350406398
-
Enforcing access control in Web-based social networks
-
Article 6 November 2009
-
Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur. 13, 1, Article 6 (November 2009).
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
16
-
-
0036362646
-
Extracting reputation in multi agent systems by means of social network topology
-
ACM, New York, NY, USA
-
Josep M. Pujol, Ramon Sangüesa, and Jordi Delgado. 2002. Extracting reputation in multi agent systems by means of social network topology. In Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1 (AAMAS '02). ACM, New York, NY, USA, 467-474.
-
(2002)
Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1 (AAMAS '02)
, pp. 467-474
-
-
Pujol, J.M.1
Sangüesa, R.2
Delgado, J.3
-
17
-
-
34247346997
-
Secure information sharing enabled by Trusted Computing and PEI models
-
ACM, New York, NY, USA
-
Ravi Sandhu, Kumar Ranganathan, and Xinwen Zhang. 2006. Secure information sharing enabled by Trusted Computing and PEI models. In Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS '06). ACM, New York, NY, USA, 2-12.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS '06)
, pp. 2-12
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
18
-
-
23944457406
-
Wireless hotspots: Current challenges and future directions
-
June 2005
-
Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl. 2005. Wireless hotspots: current challenges and future directions. Mob. Netw. Appl. 10, 3 (June 2005), 265-274.
-
(2005)
Mob. Netw. Appl.
, vol.10
, Issue.3
, pp. 265-274
-
-
Balachandran, A.1
Voelker, G.M.2
Bahl, P.3
-
19
-
-
33745922391
-
Wireless hotspots: Petri dish of wireless security
-
June 2006
-
Bruce Potter. 2006. Wireless hotspots: petri dish of wireless security. Commun. ACM 49, 6 (June 2006), 50-56.
-
(2006)
Commun. ACM
, vol.49
, Issue.6
, pp. 50-56
-
-
Potter, B.1
-
20
-
-
84856168175
-
-
JiWire, http://www.jiwire.com.
-
-
-
-
21
-
-
84856149216
-
-
Boingo, http://www.boingo.com/.
-
-
-
-
22
-
-
84856149215
-
-
Fon, http://corp.fon.com/en.
-
-
-
-
23
-
-
84856149214
-
-
Meraki, http://meraki.com/.
-
-
-
-
24
-
-
33847747934
-
-
Ph.D. dissertation, Trinity College, University of Dublin, Dublin, Ireland
-
J.M. Seigneur, "Trust, Security and Privacy in Global Computing", Ph.D. dissertation, Trinity College, University of Dublin, Dublin, Ireland, 2005.
-
(2005)
Trust, Security and Privacy in Global Computing
-
-
Seigneur, J.M.1
|