Sciweavers

127 search results - page 21 / 26
» Collaborative Learning in a Wiki Environment: Experiences fr...
Sort
View
IWPC
2006
IEEE
14 years 1 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
FECS
2010
236views Education» more  FECS 2010»
13 years 5 months ago
Development of a system for teaching CS1 in C/C++ with Lego NXT robots
This paper describes the development of a system for teaching C/C++ using a LegoTM NXT in a CSI college course on introductory programming. The programming of the NXT robot has be...
Amy Delman, Adiba Ishak, Lawrence Goetz, Mikhail K...
AGILEDC
2007
IEEE
14 years 2 months ago
How We Made Onsite Customer Work - An Extreme Success Story
The Agile Manifesto emphasizes customer collaboration over contract negotiation. No Extreme Programming practice embodies this more than onsite customer. This paper describes our ...
Michelle Williams, Jay Packlick, Rajeev Bellubbi, ...
COMPSAC
2006
IEEE
14 years 1 months ago
An Approach for Developing Adaptive, Mobile Applications with Separation of Concerns
Modern mobile computing paradigms have set new challenges for the development of distributed mobile applications and services. Because of the variability which characterizes the c...
Nearchos Paspallis, George A. Papadopoulos
CCE
2004
13 years 7 months ago
Workflow and information centered support of design processes - the IMPROVE perspective
Design process excellence is considered a major differentiating factor between competing enterprises since it determines the constraints within which plant operation and supply ch...
Wolfgang Marquardt, Manfred Nagl