Sciweavers

2212 search results - page 325 / 443
» User-Based Active Learning
Sort
View
ESSOS
2009
Springer
14 years 5 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
SIGCSE
2006
ACM
156views Education» more  SIGCSE 2006»
14 years 4 months ago
A Virtual Laboratory Model for Encouraging Undergraduate Research
Undergraduate students who perform research benefit greatly from the experience, yet achieving high levels of voluntary participation remains an elusive goal. This paper describes...
Thomas P. Way
SIGITE
2005
ACM
14 years 3 months ago
Hands-on approach to teaching computer networking using packet traces
This paper describes a novel approach to teaching computer networking through packet traces of actual network traffic. The paper describes a set of exercises that use packet trace...
Jeanna Neefe Matthews
CCIA
2005
Springer
14 years 3 months ago
Classifying Natural Objects on Outdoor Scenes
We propose an hybrid and probabilistic classification of image regions belonging to scenes primarily containing natural objects, e.g. sky, trees, etc. as a first step in solving ...
Anna Bosch, Xavier Muñoz, Joan Martí...
CEAS
2005
Springer
14 years 3 months ago
Good Word Attacks on Statistical Spam Filters
Unsolicited commercial email is a significant problem for users and providers of email services. While statistical spam filters have proven useful, senders of spam are learning ...
Daniel Lowd, Christopher Meek