Sciweavers

2648 search results - page 480 / 530
» Human Factors In Computer Security
Sort
View
SIGCSE
2010
ACM
219views Education» more  SIGCSE 2010»
15 years 3 months ago
The design of an online environment to support pedagogical code reviews
Inspired by the formal code inspection process commonly used in the software industry, we have been exploring the use of pedagogical code reviews (PCRs), in which a team of three ...
Christopher D. Hundhausen, Anukrati Agrawal, Kyle ...
SIGUCCS
2003
ACM
15 years 3 months ago
What's old is new again: training is the information technology constant
This paper is an account of some of the more instructive experiences we gained as we sought to ensure that our information technology training programs kept pace with a fast chang...
George Bradford
EICS
2009
ACM
15 years 2 months ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
SIGGRAPH
1997
ACM
15 years 2 months ago
Recovering high dynamic range radiance maps from photographs
We present a method of recovering high dynamic range radiance maps from photographs taken with conventional imaging equipment. In our method, multiple photographs of the scene are...
Paul E. Debevec, Jitendra Malik
ECCV
2010
Springer
15 years 1 months ago
Predicting Facial Beauty without Landmarks
A fundamental task in artificial intelligence and computer vision is to build machines that can behave like a human in recognizing a broad range of visual concepts. This paper aims...