Basic Concepts on RIAs
暂无分享,去创建一个
[1] Giner Alor-Hernández,et al. Aspect-Oriented Programming (AOP) Support on RIAs Development , 2018 .
[2] C. R. Livermore. E-Politics and Organizational Implications of the Internet: Power, Influence and Social Change , 2012 .
[3] Joel Benson,et al. E‐Learning…what is it? , 2012 .
[4] José Matías Rivero,et al. Definición de Rich Internet Applications a través de modelos de dominio específico , 2009 .
[5] Mahesh S. Raisinghani,et al. E-Politics in the Internet Era: Key Implications and Opportunities , 2012 .
[6] Yana Breindl,et al. From the Internet to the Corridors: How Digital Rights Advocates Influence European Union Intellectual Property Legislations , 2012 .
[7] Naveen Chilamkurti. Security, Design, and Architecture for Broadband and Wireless Network Technologies , 2013 .
[8] G. Barnett,et al. Comparing the Influence of Social Networks Online and Offline on Decision Making: The U.S. Senate Case , 2012 .
[9] Rober Morales-Chaparro,et al. On the Implementation of Multiplatform RIA User Interface Components , 2008, IWWOST@ICWE.
[10] Luis Omar Colombo-Mendoza,et al. Frameworks, Methodologies, and Tools for Developing Rich Internet Applications , 2014 .
[11] Anastasia Kavada,et al. Between Individuality and Collectiveness: Email Lists and Face-to-Face Contact in the Global Justice Movement , 2010, Int. J. E Politics.
[12] Giovanni Toffetti Carughi,et al. Capturing RIA concepts in a web modeling language , 2006, WWW '06.
[13] Marco Brambilla,et al. Business Process-Based Conceptual Design of Rich Internet Applications , 2008, 2008 Eighth International Conference on Web Engineering.
[14] Manuela Pereira,et al. Encyclopedia of Internet Technologies and Applications , 2007 .
[15] Susana Sargento,et al. Scalable Reservation-Based QoS Architecture (SRBQ) , 2008 .
[16] Tim O'Reilly,et al. What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software , 2007 .
[17] Brian S. Krueger,et al. Analyzing the Capacity of Unsolicited Political Email , 2012 .
[18] Kyungbaek Kim,et al. Efficient and Scalable Client-Clustering for Proxy Cache , 2003, HSNMC.
[19] Alan Rea,et al. Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management , 2010 .