Sciweavers

3155 search results - page 72 / 631
» How Are You Doing
Sort
View
CHI
2007
ACM
14 years 8 months ago
Do life-logging technologies support memory for the past?: an experimental study using sensecam
We report on the results of a study using SenseCam, a "lifelogging" technology in the form of a wearable camera, which aims to capture data about everyday life in order ...
Abigail Sellen, Andrew Fogg, Mike Aitken, Steve Ho...
WCRE
2007
IEEE
14 years 2 months ago
Do Code and Comments Co-Evolve? On the Relation between Source Code and Comment Changes
Comments are valuable especially for program understanding and maintenance, but do developers comment their code? To which extent do they add comments or adapt them when they evol...
Beat Fluri, Michael Würsch, Harald Gall
TON
2008
75views more  TON 2008»
13 years 7 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
CHI
2006
ACM
14 years 8 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
SIGCSE
2005
ACM
113views Education» more  SIGCSE 2005»
14 years 1 months ago
Learning by doing: introducing version control as a way to manage student assignments
Professional software developers use version control systems to coordinate their work, and to provide an unwindable history of their project’s evolution. In contrast, students i...
Karen L. Reid, Gregory V. Wilson