Sciweavers

COMPUTER
2006
64views more  COMPUTER 2006»
13 years 4 months ago
How Secure is RFID?
Sixto Ortiz Jr.
COMPUTER
2006
116views more  COMPUTER 2006»
13 years 4 months ago
Assistive Embedded Technologies
Priya Narasimhan
COMPUTER
2006
74views more  COMPUTER 2006»
13 years 4 months ago
Eyes on the World
Mor Naaman
COMPUTER
2006
67views more  COMPUTER 2006»
13 years 4 months ago
Game Design Education: Integrating Computation and Culture
Janet Murray, Ian Bogost, Michael Mateas, Michael ...
COMPUTER
2006
45views more  COMPUTER 2006»
13 years 4 months ago
Enabling Simulation Interoperability
Katherine L. Morse, Michael R. Lightner, Reed Litt...
COMPUTER
2006
98views more  COMPUTER 2006»
13 years 4 months ago
Componentization: The Visitor Example
: In software design, laziness is a virtue: it's better to reuse than to redo. Design patterns are a good illustration. Patterns, a major advance in software architecture, pro...
Bertrand Meyer, Karine Arnout
COMPUTER
2006
84views more  COMPUTER 2006»
13 years 4 months ago
Testable, Reusable Units of Cognition
The educational content of a technical topic consists, ultimately, of elementary chunks of knowledge. Identifying and classifying such units -- Testable, Reusable Units of Cogniti...
Bertrand Meyer
COMPUTER
2006
130views more  COMPUTER 2006»
13 years 4 months ago
The Unspoken Revolution in Software Engineering
ly, we should be glad they can join the fun. For some compaThe Unspoken Revolution in Software Engineering Bertrand Meyer, ETH Zurich Software professionals must adapt to the new r...
Bertrand Meyer