Sciweavers

908 search results - page 2 / 182
» Additional methods when using email for teaching
Sort
View
SIAMSC
2011
151views more  SIAMSC 2011»
13 years 1 months ago
Inexact Newton Methods with Restricted Additive Schwarz Based Nonlinear Elimination for Problems with High Local Nonlinearity
The classical inexact Newton algorithm is an efficient and popular technique for solving large sparse nonlinear system of equations. When the nonlinearities in the system are wellb...
Xiao-Chuan Cai, Xuefeng Li
JCS
2010
135views more  JCS 2010»
13 years 4 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
13 years 7 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
IADIS
2004
13 years 7 months ago
Students Text-Production Methods when Learning with the Internet
The increasing use of multimedia in education makes text-production with computers important for students. What kind of role does the Internet play here as an external source of i...
Burkhard Priemer, Maria Ploog
SIGCSE
2005
ACM
163views Education» more  SIGCSE 2005»
13 years 11 months ago
Using SeSFJava in teaching introductory network courses
Networking course projects are usually described by an informal specification and a collection of test cases. Students often misunderstand the specification or oversimplify it t...
Tamer Elsharnouby, A. Udaya Shankar