Sciweavers

2648 search results - page 327 / 530
» Human Factors In Computer Security
Sort
View
104
Voted
SIGITE
2004
ACM
15 years 9 months ago
Experiences using tablet PCs in a programming laboratory
This experience report describes lessons learned using first generation tablet PCs to support active learning in an undergraduate computer science laboratory course. We learned th...
Stephen H. Edwards, N. Dwight Barnette
124
Voted
CIKM
2009
Springer
15 years 8 months ago
Personalization as a service: the architecture and a case study
Cloud computing has become a hot topic in the IT industry. Great efforts have been made to establish cloud computing platforms for enterprise users, mostly small businesses. Howe...
Hang Guo, Jidong Chen, Wentao Wu, Wei Wang 0009
124
Voted
ASSETS
2008
ACM
15 years 5 months ago
Sudoku access: a sudoku game for people with motor disabilities
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer g...
Stéphane Norte, Fernando G. Lobo
187
Voted
ACMSE
2011
ACM
14 years 3 months ago
Targeting FPGA-based processors for an implementation-driven compiler construction course
This paper describes the adaptation of a modern compiler construction course to target an FPGA-based hardware platform used throughout our computer science curriculum. One of the ...
D. Brian Larkins, William M. Jones
126
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll