Sciweavers

4172 search results - page 608 / 835
» Computing Machinery and Understanding
Sort
View
SIGCSE
2006
ACM
139views Education» more  SIGCSE 2006»
15 years 10 months ago
Closing the loop on test creation: a question assessment mechanism for instructors
New accreditation requirements focus on education as a “continuous improvement process.” The most important part of such a process is that information gets fed back into the s...
Titus Winters, Tom Payne
SIGCSE
2006
ACM
133views Education» more  SIGCSE 2006»
15 years 10 months ago
Student progress monitoring tool using treeview
In this paper, we present an extensible visualization tool that is being used in a web-based closed laboratory system. The goal of this project is to provide a tool for both stude...
Jungsoon P. Yoo, Sung K. Yoo, Chris Lance, Judy Ha...
SOUPS
2006
ACM
15 years 10 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
CRV
2005
IEEE
153views Robotics» more  CRV 2005»
15 years 10 months ago
Detecting Abnormal Gait
Analyzing human gait has become popular in computer vision. So far, however, contributions to this topic almost exclusively considered the problem of person identification. In th...
Christian Bauckhage, John K. Tsotsos, Frank E. Bun...
ECBS
2005
IEEE
160views Hardware» more  ECBS 2005»
15 years 10 months ago
Traceability-Driven Model Refinement for Test Case Generation
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...
Matthias Riebisch, Michael Hübner