Sciweavers

16 search results - page 2 / 4
» Towards understanding programs through wear-based filtering
Sort
View
ISSA
2008
13 years 6 months ago
Bloom's Taxonomy for Information Security Education
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user educati...
Johan Van Niekerk, Rossouw von Solms
JUCS
2006
92views more  JUCS 2006»
13 years 5 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
VL
2010
IEEE
209views Visual Languages» more  VL 2010»
13 years 3 months ago
Towards the Automatic Recognition of Computational Thinking for Adaptive Visual Language Learning
Visual programming languages can be used to make computer science more accessible to a broad range of students. The evaluative focus of current research in the area of visual lang...
Kyu Han Koh, Ashok R. Basawapatna, Vicki Bennett, ...
MOBIHOC
2005
ACM
14 years 4 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
IROS
2007
IEEE
129views Robotics» more  IROS 2007»
13 years 11 months ago
Decomposition of line segments into corner and statistical grown line features in an EKF-SLAM framework
Abstract— Robots are emerging from industrial plants toward every people’s daily life. Thus, navigation in and understanding of human related environments becomes a prerequisit...
Christian Pascal Connette, Oliver Meister, Martin ...