Sciweavers

26354 search results - page 143 / 5271
» How we refactor, and how we know it
Sort
View
SIGCSE
2010
ACM
145views Education» more  SIGCSE 2010»
14 years 3 months ago
How do computing faculty adopt curriculum innovations?: the story from instructors
This paper presents the findings of an exploratory, qualitative study revealing computing instructors’ experience in adopting curriculum innovations. We interviewed eight instru...
Lijun Ni, Tom McKlin, Mark Guzdial
IAW
2003
IEEE
14 years 3 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
AINA
2009
IEEE
14 years 3 months ago
How Long is the Lifetime of a Wireless Sensor Network?
Wireless sensor networks (WSNs) are known to be highly energy-constrained and each network’s lifetime has a strong dependence on the nodes’ battery capacity. As such, the netw...
Nok Hang Mak, Winston Khoon Guan Seah
ECCV
2010
Springer
14 years 3 months ago
What, Where & How Many? Combining Object Detectors and CRFs
Abstract. Computer vision algorithms for individual tasks such as object recognition, detection and segmentation have shown impressive results in the recent past. The next challeng...
ACSAC
2000
IEEE
14 years 2 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti