Sciweavers

729 search results - page 46 / 146
» A practical method for courseware evaluation
Sort
View
CNSM
2010
13 years 5 months ago
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
Confidentiality is a critical aspect in todays Risk Assessment (RA) practices for many industrial organizations. Assessing confidentiality risks is challenging and the result of a ...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel...
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 4 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
CHI
2008
ACM
13 years 9 months ago
Introducing item response theory for measuring usability inspection processes
Usability evaluation methods have a long history of research. Latest contributions significantly raised the validity of method evaluation studies. But there is still a measurement...
Martin Schmettow, Wolfgang Vietze
PLDI
1995
ACM
13 years 11 months ago
Flow-Sensitive Interprocedural Constant Propagation
We present a flow-sensitive interprocedural constant propagation algorithm, which sttpports recursion while only performing one flow-sensitive analysis of each procedure. We prese...
Paul R. Carini, Michael Hind
COLING
2008
13 years 9 months ago
Instance-Based Ontology Population Exploiting Named-Entity Substitution
We present an approach to ontology population based on a lexical substitution technique. It consists in estimating the plausibility of sentences where the named entity to be class...
Claudio Giuliano, Alfio Massimiliano Gliozzo