Sciweavers

31 search results - page 3 / 7
» The New Computational and Data Sciences Undergraduate Progra...
Sort
View
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
14 years 3 months ago
Pedagogy and Overview of a Graduate Program in Digital Investigation Management
Although still a relatively new undergraduate course of study at most colleges and universities, specialized degree programs in computer forensics and digital investigations are n...
Gary C. Kessler, Don Haggerty
SIGCSE
2005
ACM
133views Education» more  SIGCSE 2005»
14 years 2 months ago
Designing, implementing, and analyzing a placement test for introductory CS courses
An introductory CS1 course presents problems for educators and students due to students’ diverse background in programming knowledge and exposure. Students who enroll in CS1 als...
Leen-Kiat Soh, Ashok Samal, Suzette Person, Gwen N...
ACMSE
2010
ACM
13 years 6 months ago
Visualization of the CreSIS Greenland data sets
The Center for Remote Sensing of Ice Sheets (CReSIS) has been compiling Greenland ice sheet thickness data since 1993. The airborne program utilizes a 150 MHz radar echo sounder to...
Shaketia L. McCoy, Michael Austin, Frensha Slaught...
DGO
2003
140views Education» more  DGO 2003»
13 years 10 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
NDSS
2008
IEEE
14 years 3 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...