Sciweavers

128 search results - page 17 / 26
» A Detailed Analysis of SAFER K
Sort
View
SIGCSE
2004
ACM
101views Education» more  SIGCSE 2004»
14 years 1 months ago
Components-first approaches to CS1/CS2: principles and practice
Ê Among the many ways to focus CS1/CS2 content, two have been published that emphasize concepts of component-based software engineering. Courses based on these two instances of a ...
Emily Howe, Matthew Thornton, Bruce W. Weide
CCS
2003
ACM
14 years 25 days ago
Print signatures for document authentication
We present a novel solution for authenticating printed paper documents by utilizing the inherent non–repeatable randomness existing in the printing process. For a document print...
Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
COMPSAC
2009
IEEE
14 years 9 days ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
ESWS
2008
Springer
13 years 9 months ago
Wikipedia Link Structure and Text Mining for Semantic Relation Extraction
Abstract. Wikipedia, a collaborative Wiki-based encyclopedia, has become a huge phenomenon among Internet users. It covers huge number of concepts of various fields such as Arts, G...
Kotaro Nakayama, Takahiro Hara, Shojiro Nishio
SIMUTOOLS
2008
13 years 9 months ago
Simulating wireless and mobile networks in OMNeT++ the MiXiM vision
Wireless communication has attracted considerable interest in the research community, and many wireless networks are evaluated using discrete event simulators like OMNeT++. Althou...
A. Köpke, M. Swigulski, K. Wessel, D. Willkom...