Sciweavers

1173 search results - page 18 / 235
» Identifying Successful Telecommuters
Sort
View
70
Voted
IJIEM
2010
126views more  IJIEM 2010»
14 years 7 months ago
E-Health readiness framework from Electronic Health Records perspective
E-Health systems include applications of information communication technologies to promote healthcare services support, delivery and education. The success of an E-Health system i...
JunHua Li, Lesley Pek Wee Land, Pradeep Ray, Subha...
ICST
2009
IEEE
14 years 7 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
ICPR
2000
IEEE
15 years 10 months ago
Using Head Movement to Recognize Activity
This paper presents a methodology for automatically identifying human actions in either the frontal or the lateral view. By tracking the movement of the head of the subject over s...
Anant Madabhushi, J. K. Aggarwal
AAAI
2006
14 years 11 months ago
How Many Different "John Smiths", and Who Are They?
In this work we propose three unsupervised measures to automatically identify the number of distinct entities a given ambiguous name refers to in a corpus. We experiment with 22 a...
Anagha Kulkarni, Ted Pedersen
SIGCSE
1996
ACM
143views Education» more  SIGCSE 1996»
15 years 1 months ago
The quest for excellence in designing CS1/CS2 assignments
We identify the principles involved in designing effective programming assignments for CS1/CS2. Through a case study of a particularly successful recursion assignment, we establis...
Todd J. Feldman, Julie Zelenski