When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Computer Science (CS) education researchers hope their research has real impact on teaching practices. Developers of innovative curricula and tools for CS education want teachers ...
Two mathematical and two computational theories from the field of human and animal learning are combined to produce a more general theory of adaptive behavior. The cornerstone of ...
J. J. McDowell, Paul L. Soto, Jesse Dallery, Saule...
The decreasing cost of technology and Internet access has resulted in increasingly large-scale scientific research projects that rely on technology-mediated public participation....
Consideration of cost and resource benefits generated from an alliance have prevailed the theoretical and empirical research about strategic alliances and value networks/ webs. As...