Sciweavers

6884 search results - page 139 / 1377
» The macro-structure of use of help
Sort
View
USS
2008
13 years 11 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
INFOVIS
2000
IEEE
14 years 1 months ago
A Taxonomy of Visualization Techniques Using the Data State Reference Model
In previous work, researchers have attempted to construct taxonomies of information visualization techniques by examining the data domains that are compatible with these technique...
Ed Huai-hsin Chi
SIGCSE
2009
ACM
111views Education» more  SIGCSE 2009»
14 years 9 months ago
Using daily student presentations to address attitudes and communication skills in CS1
Many CS1 courses lack a breadth in coverage of computing related topics and do not actively engage in nonprogramming computer science topics. In addition, many introductory (and...
Chris Bennett, Timothy Urness
ACL
2008
13 years 10 months ago
An Unsupervised Vector Approach to Biomedical Term Disambiguation: Integrating UMLS and Medline
This paper introduces an unsupervised vector approach to disambiguate words in biomedical text that can be applied to all-word disambiguation. We explore using contextual informat...
Bridget McInnes
ESANN
2006
13 years 10 months ago
Hierarchical analysis of GSM network performance data
In this study, a method for hierarchical examination and visualization of GSM data using the Self-Organizing Map (SOM) is described. The data is examined in few phases. At first te...
Mikko Multanen, Kimmo Raivio, Pasi Lehtimäki