Sciweavers

317 search results - page 10 / 64
» Who gives a tweet
Sort
View
PODS
2005
ACM
96views Database» more  PODS 2005»
14 years 9 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
ICSE
2003
IEEE-ACM
14 years 9 months ago
Experiences from the Architectural Change Process
A good software architecture is becoming recognized as a major factor for successful products. There has been much research on the technical aspects of software architecture and i...
Josef Nedstam, Even-André Karlsson, Martin ...
ICNP
2007
IEEE
14 years 3 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
ITICSE
2004
ACM
14 years 2 months ago
Program quality with pair programming in CS1
Prior research on pair programming has found that compared to students who work alone, students who pair have shown increased confidence in their work, greater success in CS1, an...
Brian Hanks, Charlie McDowell, David Draper, Milov...
ITS
2004
Springer
156views Multimedia» more  ITS 2004»
14 years 2 months ago
Tactical Language Training System: An Interim Report
Tactical Language Training System helps learners acquire basic communicative skills in foreign languages and cultures. Learners practice their communication skills in a simulated v...
W. Lewis Johnson, Carole R. Beal, Anna Fowles-Wink...