Sciweavers

19003 search results - page 49 / 3801
» We Need Assurance!
Sort
View
SIGCSE
2006
ACM
201views Education» more  SIGCSE 2006»
14 years 1 months ago
Everything I needed to know about teaching I learned in kindergarten: bringing elementary education techniques to undergraduate
By expanding the teaching styles used in computer science classrooms, we can expand the audience of students that enjoy and excel in technology. Rather than focusing on major curr...
Shannon Pollard, Robert C. Duvall
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
13 years 8 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
BIOINFORMATICS
2010
109views more  BIOINFORMATICS 2010»
13 years 8 months ago
Phylogenetic networks do not need to be complex: using fewer reticulations to represent conflicting clusters
Phylogenetic trees are widely used to display estimates of how groups of species evolved. Each phylogenetic tree can be seen as a collection of clusters, subgroups of the species ...
Leo van Iersel, Steven Kelk, Regula Rupp, Daniel H...
CHI
2010
ACM
13 years 6 months ago
Social tagging revamped: supporting the users' need of self-promotion through persuasive techniques
People share pictures online to increase their social presence. However, recent studies have shown that most of the content shared in social networks is not looked at by peers. Pr...
Mauro Cherubini, Alejandro Gutierrez, Rodrigo de O...
IPPS
2008
IEEE
14 years 2 months ago
On the need for query-centric unstructured peer-to-peer overlays
—Hybrid P2P systems rely on the assumption that sufficient objects exist nearby in order to make the unstructured search component efficient. This availability depends on the o...
William Acosta, Surendar Chandra