Sciweavers

493 search results - page 42 / 99
» A Methodological Review of Computer Science Education Resear...
Sort
View
IDTRUST
2010
ACM
15 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
ECIS
2001
14 years 11 months ago
Software Localization: Issues and Methods
This paper examines the key issues in software product and interface localization, including the cost and the specific aspects of software that must be localized, and a methodolog...
Rosann Webb Collins
WSC
1998
14 years 11 months ago
Simulation Based Construction Management Learning System
Incorporation into construction engineering and management curricula of tasks that improve the abilities of students to manage the complex dynamics, pressures, and demands of cons...
Anil Sawhney, André Mund
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
15 years 4 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
DAGSTUHL
2008
14 years 11 months ago
The Grand Challenges and Myths of Neural-Symbolic Computation
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field. The co...
Luís C. Lamb