Sciweavers

30 search results - page 5 / 6
» Applying the Lessons of eXtreme Programming
Sort
View
SIGCSE
2008
ACM
132views Education» more  SIGCSE 2008»
13 years 5 months ago
A case study of retention practices at the University of Illinois at Urbana-Champaign
Computer science is seeing a decline in enrollment at all levels of education. One key strategy for reversing this decline is to improve methods of student retention. This paper, ...
Tanya L. Crenshaw, Erin W. Chambers, Heather Metca...
COMPUTER
2010
127views more  COMPUTER 2010»
13 years 3 months ago
Data Stream Management Systems for Computational Finance
Computational finance leverages computer technologies to build models from large amounts of data to extract insight. In today's networked world, the amount of data available t...
Badrish Chandramouli, Mohamed H. Ali, Jonathan Gol...
ISESE
2006
IEEE
14 years 3 hour ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili
ECTEL
2009
Springer
14 years 17 days ago
LAG 2.0: Refining a Reusable Adaptation Language and Improving on Its Authoring
Reusable adaptation specifications for adaptive behaviour has come to the forefront of adaptive research recently, with EU projects such as GRAPPLE1, and PhD research efforts on de...
Alexandra I. Cristea, David Smits, Jon Bevan, Maur...
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 1 days ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin