Sciweavers

6939 search results - page 1256 / 1388
» Algorithm Engineering for Parallel Computation
Sort
View
AINA
2003
IEEE
15 years 8 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
INFOVIS
2003
IEEE
15 years 8 months ago
Multiscale Visualization of Small World Networks
Many networks under study in Information Visualization are “small world” networks. These networks first appeared in the study social networks and were shown to be relevant mod...
David Auber, Yves Chiricota, Fabien Jourdan, Guy M...
ISESE
2003
IEEE
15 years 8 months ago
Building Pair Programming Knowledge through a Family of Experiments
Pair programming is a practice in which two programmers work collaboratively at one computer on the same design, algorithm, code, or test. Pair programming is becoming increasingl...
Laurie A. Williams, Charlie McDowell, Nachiappan N...
ACSC
2002
IEEE
15 years 8 months ago
Signature Extraction for Overlap Detection in Documents
Easy access to the Web has led to increased potential for students cheating on assignments by plagiarising others’ work. By the same token, Web-based tools offer the potential f...
Raphael A. Finkel, Arkady B. Zaslavsky, Kriszti&aa...
114
Voted
SACMAT
2010
ACM
15 years 8 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
« Prev « First page 1256 / 1388 Last » Next »