Sciweavers

927 search results - page 26 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
FCT
2009
Springer
15 years 10 months ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
AI
2002
Springer
15 years 3 months ago
A hierarchical approach to computer Hex
Hex is a beautiful game with simple rules and a strategic complexity comparable to that of Chess and Go. The massive game-tree search techniques developed mostly for Chess and suc...
Vadim V. Anshelevich
ACMSE
2007
ACM
15 years 8 months ago
Integrating BlackBerry wireless devices into computer programming and literacy courses
In this paper we describe our experience in integrating the RIM's BlackBerry handheld wireless device into programming and literacy courses at the University of Guelph and th...
Qusay H. Mahmoud, Allan Dyer
GRAPHICSINTERFACE
1996
15 years 5 months ago
Exploring Human Visualization of Computer Algorithms
Many educators have used Algorithm Visualization (AV) to teach students of computer science about how computer algorithms work. Our study sheds light on two important questions: (...
Sarah A. Douglas, Christopher D. Hundhausen, Donna...
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 9 months ago
On the Limits of Bottom-Up Computer Simulation: Towards a Nonlinear Modeling Culture
1 In the complexity and simulation communities there is growing support for the use of bottom-up computer-based simulation in the analysis of complex systems. The presumption is th...
Kurt A. Richardson