Sciweavers

1663 search results - page 209 / 333
» Computer Security in the Real World
Sort
View
ITICSE
2004
ACM
15 years 9 months ago
Self-efficacy and mental models in learning to program
Learning to program is a unique experience for each student, and it is not fully understood why one person in an introductory programming course learns to program better and more ...
Vennila Ramalingam, Deborah LaBelle, Susan Wiedenb...
172
Voted
ARGMAS
2004
Springer
15 years 9 months ago
An Argument-Based Framework to Model an Agent's Beliefs in a Dynamic Environment
Abstract. One of the most difficult problems in multiagent systems involves representing knowledge and beliefs of agents in dynamic environments. New perceptions modify an agent’...
Marcela Capobianco, Carlos Iván Chesñ...
130
Voted
IEEEAMS
2003
IEEE
15 years 9 months ago
Kinesthetics eXtreme: An External Infrastructure for Monitoring Distributed Legacy Systems
Autonomic computing – self-configuring, self-healing, self-optimizing applications, systems and networks – is widely believed to be a promising solution to everincreasing syst...
Gail E. Kaiser, Janak J. Parekh, Philip Gross, Giu...
SIGCSE
2009
ACM
161views Education» more  SIGCSE 2009»
15 years 8 months ago
An activity-based sensor networks course for undergraduates with sun spot devices
Wireless sensor networks are revolutionizing the instrumentation of the physical world, across scientific, industrial and military applications. In this paper, we describe our eff...
Damon Tyman, Nirupama Bulusu, Jens Mache
SIGGRAPH
1999
ACM
15 years 8 months ago
Implicit Fairing of Irregular Meshes Using Diffusion and Curvature Flow
In this paper, we develop methods to rapidly remove rough features from irregularly triangulated data intended to portray a smooth surface. The main task is to remove undesirable ...
Mathieu Desbrun, Mark Meyer, Peter Schröder, ...