Sciweavers

26354 search results - page 23 / 5271
» How we refactor, and how we know it
Sort
View
ITICSE
2004
ACM
14 years 1 months ago
What do we mean by theoretically sound research in computer science education?
With our interest to improve our education in computer science, an understanding of how students learn about CS concepts, how different concepts are understood, as well as the con...
Mordechai Ben-Ari, Anders Berglund, Shirley Booth,...
OTM
2005
Springer
14 years 1 months ago
Biomedical Retrieval: How Can a Thesaurus Help?
Abstract. Searching specialized collections, such as biomedical literature, typically requires intimate knowledge of a specialized terminology. Hence, it can be a disappointing exp...
Leonie IJzereef, Jaap Kamps, Maarten de Rijke
IFL
2007
Springer
162views Formal Methods» more  IFL 2007»
14 years 1 months ago
Testing Erlang Refactorings with QuickCheck
Abstract. Refactoring is a technique for improving the design of existing programs without changing their behaviour. Wrangler is a tool built at the University of Kent to support E...
Huiqing Li, Simon Thompson
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
14 years 1 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
CDC
2008
IEEE
13 years 9 months ago
Informative data: How to get just sufficiently rich?
Prediction error identification requires that data be informative with respect to the chosen model structure. Whereas sufficient conditions for informative experiments have been av...
Michel Gevers, Alexandre S. Bazanella, Ljubisa Mis...