Sciweavers

262 search results - page 20 / 53
» MHEG-5 - Aims, Concepts, and Implementation Issues
Sort
View
ICALT
2009
IEEE
15 years 6 months ago
An Approach for Visually Supporting the Creation of Personal Development Plans
Personal Development Plans (PDP) have positive effects in learners’ motivation and confidence since they enable individuals to reflect upon their own learning and to plan for th...
Javier Melero, Davinia Hernández Leo, Ernes...
COMPSAC
2008
IEEE
15 years 6 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 5 months ago
E-Government: The Need for Effective Process Management in the Public Sector
The concept of e-government has evolved from the domain of e-business where enterprises need to collaborate with partners, suppliers and customers for the effective delivery of e-...
Vishanth Weerakkody, Simon Baire, Jyoti Choudrie
NETGAMES
2006
ACM
15 years 5 months ago
On correctness of scalable multi-server state replication in online games
Massively Multiplayer Online Games (MMOG) require novel, scalable network architectures for a high amount of participating players in huge game worlds. Consequently, new and compl...
Jens Müller 0004, Andreas Gössling, Serg...
SOUPS
2005
ACM
15 years 5 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...