Sciweavers

20 search results - page 3 / 4
» Why Don't People Use Refactoring Tools
Sort
View
ECRIME
2007
13 years 11 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
WSC
2008
13 years 10 months ago
Better than a petaflop: The power of efficient experimental design
Recent advances in high-performance computing have pushed computational capabilities to a petaflop (a thousand trillion operations per second) in a single computing cluster. This ...
Susan M. Sanchez
ATAL
2011
Springer
12 years 7 months ago
Using iterated reasoning to predict opponent strategies
The field of multiagent decision making is extending its tools from classical game theory by embracing reinforcement learning, statistical analysis, and opponent modeling. For ex...
Michael Wunder, Michael Kaisers, John Robert Yaros...
CHI
1997
ACM
13 years 11 months ago
Sensing Activity in Video Images
in CHI’97 Extended Abstract, ACM Press, pp. 319-320 based awareness tools and iconic indicators because it meets three crucial user requirements. This paper describes the activit...
Alison Lee, Kevin Schlueter, Andreas Girgensohn
BMCBI
2005
116views more  BMCBI 2005»
13 years 7 months ago
Which gene did you mean?
Computational Biology needs computer-readable information records. Increasingly, meta-analysed and pre-digested information is being used in the follow up of high throughput exper...
Barend Mons