Sciweavers

930 search results - page 49 / 186
» Educating the Humanities for e-Science
Sort
View
SIGCSE
2005
ACM
123views Education» more  SIGCSE 2005»
15 years 3 months ago
Diversifying the images of computer science: undergraduate women take on the challenge!
This paper tells the story of a student initiative, driven by a desire to diversify the images that surround the field of computer science and those who work in it. Categories and...
Carol Frieze
CORR
2010
Springer
150views Education» more  CORR 2010»
14 years 10 months ago
Dendritic Cells for Real-Time Anomaly Detection
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the ystem. The behaviour of human DCs is abstracted to form an algorithm suitable...
Julie Greensmith, Uwe Aickelin
CORR
2010
Springer
171views Education» more  CORR 2010»
14 years 10 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
CORR
2008
Springer
52views Education» more  CORR 2008»
14 years 10 months ago
A static theory of promises
We discuss for the concept of promises within a framework that can be applied to either humans or technology. We compare promises to the more established notion of obligations and...
Jan A. Bergstra, Mark Burgess
CORR
2010
Springer
93views Education» more  CORR 2010»
14 years 9 months ago
Alternatives to Mobile Keypad Design: Improved Text Feed
In this paper we tried to focus on some of the problems with the mobile keypad and text entering in these devices, and tried to give some possible suggestions. We mainly took some...
Satish Narayana Srirama, M. A. A. Faruque, M. A. S...