Sciweavers

327 search results - page 37 / 66
» Assessing the Assessment: an Empirical Study of an Informati...
Sort
View
BMCBI
2004
174views more  BMCBI 2004»
13 years 8 months ago
Implications for domain fusion protein-protein interactions based on structural information
Background: Several in silico methods exist that were developed to predict protein interactions from the copious amount of genomic and proteomic data. One of these methods is Doma...
Jer-Ming Chia, Prasanna R. Kolatkar
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 3 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
KCAP
2005
ACM
14 years 2 months ago
Meta-level patterns for interactive knowledge capture
Current knowledge acquisition tools have limited understanding of how users enter knowledge and how acquired knowledge is used, and provide limited assistance in organizing variou...
Jihie Kim
CIKM
2009
Springer
14 years 3 months ago
Evaluation of methods for relative comparison of retrieval systems based on clickthroughs
The Cranfield evaluation method has some disadvantages, including its high cost in labor and inadequacy for evaluating interactive retrieval techniques. As a very promising alter...
Jing He, Chengxiang Zhai, Xiaoming Li
ISPW
2005
IEEE
14 years 2 months ago
Evolving Defect "Folklore": A Cross-Study Analysis of Software Defect Behavior
Abstract. Answering “macro-process” research issues – which require understanding how development processes fit or do not fit in different organizational systems and environm...
Victor R. Basili, Forrest Shull