Sciweavers

7340 search results - page 1452 / 1468
» The Behavior of Tutoring Systems
Sort
View
SIGPLAN
2008
13 years 8 months ago
Some thoughts on teaching programming and programming languages
It is argued that the teaching of programming is central to the education of skilled computer professionals, that the teaching of programming languages is central to the teaching ...
John C. Reynolds
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 8 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
IPM
2007
129views more  IPM 2007»
13 years 8 months ago
Examining the effectiveness of real-time query expansion
Interactive query expansion (IQE) (c.f. Efthimiadis, 1996) is a potentially useful technique to help searchers formulate improved query statements, and ultimately retrieve better ...
Ryen W. White, Gary Marchionini
TIP
2008
144views more  TIP 2008»
13 years 8 months ago
Incremental Refinement of Image Salient-Point Detection
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
Yiannis Andreopoulos, Ioannis Patras
TOCS
2008
154views more  TOCS 2008»
13 years 8 months ago
Adaptive work-stealing with parallelism feedback
We present an adaptive work-stealing thread scheduler, ASTEAL, for fork-join multithreaded jobs, like those written using the Cilk multithreaded language or the Hood work-stealing...
Kunal Agrawal, Charles E. Leiserson, Yuxiong He, W...
« Prev « First page 1452 / 1468 Last » Next »