Sciweavers

672 search results - page 111 / 135
» An assessment of tag presentation techniques
Sort
View
ACSAC
2002
IEEE
14 years 20 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
ACSC
2002
IEEE
14 years 20 days ago
Learning and the Reflective Journal in Computer Science
This paper describes the use of the reflective journal in a computer programming course at the University of South Australia. We describe rationale for the journal relating it to ...
S. E. George
WCRE
2002
IEEE
14 years 18 days ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
ITS
2010
Springer
152views Multimedia» more  ITS 2010»
14 years 14 days ago
A Network Analysis of Student Groups in Threaded Discussions
As online discussion boards become a popular medium for collaborative problem solving, we would like to understand patterns of group interactions that lead to collaborative learnin...
Jeon-Hyung Kang, Jihie Kim, Erin Shaw
PCI
2001
Springer
14 years 3 days ago
A Knowledge Based Approach on Educational Metadata Use
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...