Sciweavers

6884 search results - page 1357 / 1377
» The macro-structure of use of help
Sort
View
SIGUCCS
2006
ACM
14 years 1 months ago
Bridging the student support gap
In recent years, the use of a computer has become a requirement for success in a collegiate environment, and the demand for mobile computing has sharply increased. In response to ...
Gerald Bailey, Jamie Piperberg, Bud Hiller
SOUPS
2006
ACM
14 years 1 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
CIG
2005
IEEE
14 years 1 months ago
Forcing Neurocontrollers to Exploit Sensory Symmetry Through Hard-wired Modularity in the Game of Cellz
Several attempts have been made in the past to construct encoding schemes that allow modularity to emerge in evolving systems, but success is limited. We believe that in order to c...
Julian Togelius, Simon M. Lucas
DASFAA
2005
IEEE
256views Database» more  DASFAA 2005»
14 years 1 months ago
CoCache: Query Processing Based on Collaborative Caching in P2P Systems
Peer-to-peer (P2P) computing is gaining more and more significance due to its widespread use currently and potential deployments in future applications. In this paper, we propose ...
Weining Qian, Linhao Xu, Shuigeng Zhou, Aoying Zho...
IWPSE
2005
IEEE
14 years 1 months ago
EvoLens: Lens-View Visualizations of Evolution Data
Visualizing software evolution is essential for identifying design erosions that have occurred over the past releases. Making evolutionary aspects explicit via visual representati...
Jacek Ratzinger, Michael Fischer, Harald Gall
« Prev « First page 1357 / 1377 Last » Next »