Sciweavers

251 search results - page 38 / 51
» Finding Questions to Your Answers
Sort
View
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
14 years 24 days ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
CIG
2006
IEEE
14 years 24 days ago
Fun in Slots
— People play games for fun. Yet we are lacking a fundamental understanding of what fun is and how fun works in games and other media. For example, why do thousands of people spe...
Kevin Burns
ACSAC
2005
IEEE
14 years 11 days ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
GROUP
2005
ACM
14 years 9 days ago
Searching for expertise in social networks: a simulation of potential strategies
People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this...
Jun Zhang, Mark S. Ackerman
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 21 hour ago
Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein
An action research project in the state administration of Schleswig-Holstein (Germany) seeks to answer the following questions: How can we organize and present edocuments so that ...
Ralf Klischewski