Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
ct Computer generated academic papers have been used to expose a lack of thorough human review at several computer science conferences. We assess the problem of classifying such do...
As a first step in the larger project of charting the ontology of computer programs, we pose three central questions: (1) Can programs, hardware, and metaprograms be organized into...
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
This paper describes the use of a particular type of computer simulator as a tool for teaching computer architecture. The Little Man Computer (LMC) paradigm was developed by Stuar...
A visual simulator has been developed as an example of Web-based education tool, which is designed for students to understand graphically internal behavior and structure of comput...
The growing popularity of computers in all areas of daily life leads to the situation that an increasing number of people with diverse know-how of computers and software use these...
It is becoming increasingly common to see computers with two or even three monitors being used today. People seem to like having more display space available, and intuition tells ...
The use of computer applications to support learning and assessment is becoming more common, along with a growing body of research focusing on the pedagogical effectiveness of the...
We designed and evaluated an agent that recommends a pointing device gain for a given user, with mixed success. 12 participants with physical impairments used the Input Device Age...
Heidi Horstmann Koester, Edmund F. LoPresti, Richa...