Sciweavers

3937 search results - page 660 / 788
» Questioning Ubiquitous Computing
Sort
View
ISSA
2008
13 years 9 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada
IPCO
2007
108views Optimization» more  IPCO 2007»
13 years 9 months ago
Orbital Branching
We introduce orbital branching, an effective branching method for integer programs containing a great deal of symmetry. The method is based on computing groups of variables that a...
James Ostrowski, Jeff Linderoth, Fabrizio Rossi, S...
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
13 years 9 months ago
Patterns of Cascading Behavior in Large Blog Graphs
How do blogs cite and influence each other? How do such links evolve? Does the popularity of old blog posts drop exponentially with time? These are some of the questions that we ...
Jure Leskovec, Mary McGlohon, Christos Faloutsos, ...
ACE
2004
222views Education» more  ACE 2004»
13 years 9 months ago
Learning about Software Development - Should Programming Always Come First?
The issues surrounding curriculum design of many Computer Science and Software Engineering degree programs1 are many and complex. In particular, the question of whether prior prog...
Margaret Hamilton, Liz Haywood
DAGSTUHL
2006
13 years 9 months ago
Upper and Lower Bounds on Sizes of Finite Bisimulations of Pfaffian Dynamical Systems
In this paper we study a class of dynamical systems defined by Pfaffian maps. It is a sub-class of o-minimal dynamical systems which capture rich continuous dynamics and yet can be...
Margarita V. Korovina, Nicolai Vorobjov