Sciweavers

251 search results - page 38 / 51
» Finding Questions to Your Answers
Sort
View
77
Voted
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
15 years 3 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
CIG
2006
IEEE
15 years 3 months ago
Fun in Slots
— People play games for fun. Yet we are lacking a fundamental understanding of what fun is and how fun works in games and other media. For example, why do thousands of people spe...
Kevin Burns
ACSAC
2005
IEEE
15 years 3 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
GROUP
2005
ACM
15 years 3 months ago
Searching for expertise in social networks: a simulation of potential strategies
People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this...
Jun Zhang, Mark S. Ackerman
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 2 months ago
Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein
An action research project in the state administration of Schleswig-Holstein (Germany) seeks to answer the following questions: How can we organize and present edocuments so that ...
Ralf Klischewski