Sciweavers

1629 search results - page 194 / 326
» A Study of Malcode-Bearing Documents
Sort
View
JCDL
2005
ACM
84views Education» more  JCDL 2005»
14 years 2 months ago
Turning the page on navigation
In this paper, we discuss the findings of an in-depth observational study of reading and within-document navigation and add to these findings the results of a second analysis of h...
Catherine C. Marshall, Sara A. Bly
PADS
2004
ACM
14 years 2 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 9 months ago
Investigating the Potential of Test-Driven Development for Spreadsheet Engineering
It is widely documented that the absence of a structured approach to spreadsheet engineering is a key factor in the high level of spreadsheet errors. In this paper we propose and ...
Alan Rust, Brian Bishop, Kevin McDaid
ETS
2000
IEEE
100views Hardware» more  ETS 2000»
13 years 9 months ago
Pre-class Planning to Scaffold Students for Online Collaborative Learning Activities
In recent years, there is a growing interest in developing online collaborative learning environments. In a learner-centered online collaborative environment, students work togeth...
Xun Ge, Kelly Ann Yamashiro, Jack Lee
SIGIR
2012
ACM
11 years 11 months ago
Automatic suggestion of query-rewrite rules for enterprise search
Enterprise search is challenging for several reasons, notably the dynamic terminology and jargon that are specific to the enterprise domain. This challenge is partly addressed by...
Zhuowei Bao, Benny Kimelfeld, Yunyao Li