Sciweavers

927 search results - page 21 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
GI
2008
Springer
15 years 5 months ago
Tracking Mobile Phones on Interactive Tabletops
: The number of ” interactive surface” systems, especially tabletop interfaces, in public is increasing. As more and more casual users interact with such systems, they may wish...
Florian Echtler, Gudrun Klinker
JSW
2008
164views more  JSW 2008»
15 years 3 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
GI
2001
Springer
15 years 8 months ago
Extending Sunit to Test Components
To ensure the deployment of reusable and reliable components, it is important to verify their functionality. In this paper, we present a framework for component testing, an extens...
Ludger Martin, Elke Siemon
ACMSE
2006
ACM
15 years 10 months ago
Controlling the entire path of a virtual camera
This paper considers the design of a camera path through a scene. Given a valid set of keyframes for the camera, we want to build a camera path that avoids collisions with the sce...
Ross Ptacek, John K. Johnstone
SIGCSE
2010
ACM
175views Education» more  SIGCSE 2010»
15 years 9 months ago
MPCT: media propelled computational thinking
Media-Propelled Computational Thinking (MPCT – pronounced impact) is a course designed to introduce programming in the context of engaging problems in media computation, math, a...
Eric Andrew Freudenthal, Mary K. Roy, Alexandria N...