Sciweavers

353 search results - page 24 / 71
» The C Hackers Guide
Sort
View
ICALT
2008
IEEE
14 years 5 months ago
Deriving E-Assessment from a Competency Model
Self-assessment is a crucial component of learning. Creating effective questions is time-consuming, however, because it may require considerable resources and the skill of critica...
Onjira Sitthisak, Lester Gilbert, Hugh C. Davis
AINA
2007
IEEE
14 years 5 months ago
Grid-Aware Evaluation of Regular Path Queries on Spatial Networks
Regular path queries (RPQs), expressed as regular expressions over the alphabet of database edge-labels, are commonly used for guided navigation of graph databases. While convenie...
Zhuo Miao, Dan C. Stefanescu, Alex Thomo
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
14 years 5 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
ICRA
2006
IEEE
77views Robotics» more  ICRA 2006»
14 years 5 months ago
Portability and Applicability of Virtual Fixtures across Medical and Manufacturing Tasks
– Virtual fixtures are virtual constraints that enhance human performance in motion tasks. They can either confine and/or guide a user’s motion. In this paper, we use a commerc...
Henry C. Lin, Keith Mills, Peter Kazanzides, Grego...
EEE
2005
IEEE
14 years 4 months ago
A Systematic Approach to the Development of E-Commerce Sites for Mass Customization
E-commerce web sites that sell highly customized products tend to be very complex in terms of the underlying logical model of the customization process. We present a systematic ap...
Andrea Lombardoni, Moira C. Norrie, Nadir Weibel, ...