Sciweavers

1074 search results - page 143 / 215
» Evaluating student experiences in developing software for hu...
Sort
View
SIGUCCS
2005
ACM
14 years 2 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
CGO
2006
IEEE
14 years 3 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan
CHI
2006
ACM
14 years 9 months ago
Incompatible BLOCK: wonders accompanied interface
For interface design, improving user curiosity is important, as is intuitiveness and intelligibility. We think the wonder of 2D property input becoming 3D, as expected by the user...
Jun Fujiki, Taketoshi Ushiama, Kiyoshi Tomimatsu
ISWC
2002
IEEE
14 years 2 months ago
A Wearable Computer for Support of Astronaut Extravehicular Activity
A wearable situational awareness terminal (WearSAT) that provides text, graphics, and video to an astronaut via a near-eye display, and acts as a client on a wireless network, has...
Christopher E. Carr, Steven J. Schwartz, Ilia Rose...