Sciweavers

908 search results - page 15 / 182
» Additional methods when using email for teaching
Sort
View
IJSN
2007
73views more  IJSN 2007»
14 years 11 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
MP
2008
117views more  MP 2008»
14 years 11 months ago
Multiplier convergence in trust-region methods with application to convergence of decomposition methods for MPECs
Abstract. We study piecewise decomposition methods for mathematical programs with equilibrium constraints (MPECs) for which all constraint functions are linear. At each iteration o...
Giovanni Giallombardo, Daniel Ralph
CIDM
2007
IEEE
15 years 3 months ago
Mining the Students' Learning Interest in Browsing Web-Streaming Lectures
Web-Streaming lectures overcome the space and time barriers between learning and teaching, but bring higher requirements on the learning feedback of students when they browse lectu...
Long Wang 0002, Christoph Meinel
TIFS
2010
143views more  TIFS 2010»
14 years 6 months ago
Face verification across age progression using discriminative methods
Face verification in the presence of age progression is an important problem that has not been widely addressed. In this paper, we study the problem by designing and evaluating dis...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
ICSE
2008
IEEE-ACM
16 years 15 days ago
Best practices in extreme programming course design
Teaching (and therefore learning) eXtreme Programming (XP) in a university setting is difficult because of course time limitations and the soft nature of XP that requires first-ha...
Kai Stapel, Daniel Lübke, Eric Knauss