Sciweavers

3155 search results - page 138 / 631
» How Are You Doing
Sort
View
ICADL
2007
Springer
112views Education» more  ICADL 2007»
13 years 9 months ago
Humanities Graduate Students' Use Behavior on Full-Text Databases for Ancient Chinese Books
Digitizing ancient books, especially those related to the humanities, is practiced in many countries. The number of full-text databases in the humanities is increasing. Studies hav...
Ming-der Wu, Shih-chuan Chen
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
ISEUD
2009
Springer
14 years 2 months ago
Males' and Females' Script Debugging Strategies
Little research has addressed IT professionals’ script debugging strategies, or considered whether there may be gender differences in these strategies. What strategies do male an...
Valentina Grigoreanu, James Brundage, Eric Bahna, ...
DRM
2007
Springer
14 years 2 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko
ISPW
2005
IEEE
14 years 1 months ago
Evolving Defect "Folklore": A Cross-Study Analysis of Software Defect Behavior
Abstract. Answering “macro-process” research issues – which require understanding how development processes fit or do not fit in different organizational systems and environm...
Victor R. Basili, Forrest Shull