Sciweavers

1391 search results - page 271 / 279
» The end of software training
Sort
View
CCS
2004
ACM
14 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
PATAT
2004
Springer
130views Education» more  PATAT 2004»
14 years 3 months ago
Learning User Preferences in Distributed Calendar Scheduling
Abstract. Within the field of software agents, there has been increasing interest in automating the process of calendar scheduling in recent years. Calendar (or meeting) schedulin...
Jean Oh, Stephen F. Smith
SIGCSE
2010
ACM
219views Education» more  SIGCSE 2010»
14 years 3 months ago
The design of an online environment to support pedagogical code reviews
Inspired by the formal code inspection process commonly used in the software industry, we have been exploring the use of pedagogical code reviews (PCRs), in which a team of three ...
Christopher D. Hundhausen, Anukrati Agrawal, Kyle ...
PPPJ
2009
ACM
14 years 2 months ago
Virtual reuse distance analysis of SPECjvm2008 data locality
Reuse distance analysis has been proved promising in evaluating and predicting data locality for programs written in Fortran or C/C++. But its effect has not been examined for ap...
Xiaoming Gu, Xiao-Feng Li, Buqi Cheng, Eric Huang
SIGUCCS
2009
ACM
14 years 2 months ago
Frontline support at Princeton University: a centralized and decentralized approach
Frontline support and maintenance for desktop hardware and software systems at Princeton University has been uniquely structured, allowing the benefits of centralization and the f...
Maureen A. Novozinsky, Evelyne S. Roach, Leila M. ...