Sciweavers

101 search results - page 1 / 21
» Information Technology Contests - Introduction to Computer S...
Sort
View
CHI
2009
ACM
14 years 5 months ago
Studying appropriation of everyday technologies: a cognitive approach
The ways in which users appropriate uses of technology ? or invent new ones ? have attracted interest in CSCW-oriented research, but much less has been written on its cognitive fo...
Antti Salovaara
INFOSECCD
2006
ACM
13 years 10 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
ACSAC
2001
IEEE
13 years 8 months ago
Information Security: Science, Pseudoscience, and Flying Pigs
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
Roger R. Schell
ITICSE
2006
ACM
13 years 10 months ago
Gender gap in computer science does not exist in one former soviet republic: results of a study
It is well known that women’s involvement in the field of Computer Science is very low in the USA. This is viewed as a significant problem and has become a great concern to educ...
Hasmik Gharibyan, Stephan Gunsaulus
SIGCSE
2009
ACM
179views Education» more  SIGCSE 2009»
14 years 5 months ago
Methods, metrics and motivation for a green computer science program
Computer science educators are uniquely positioned to promote greater awareness of Green Computing, using the academic setting to encourage environmentally conscious use of techno...
Mujtaba Talebi, Thomas Way