Sciweavers

2208 search results - page 175 / 442
» Memory Practices in the Sciences
Sort
View
CSCW
2010
ACM
15 years 7 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock
SIGCSE
2010
ACM
169views Education» more  SIGCSE 2010»
15 years 5 months ago
Interfaces first (and foremost) with Java
ion is a critical concept that underlies many topics in computing science. For example, in software engineering, the distinction between a component’s behavior and its implement...
Paolo A. G. Sivilotti, Matthew Lang
SIGGRAPH
2009
ACM
15 years 4 months ago
Who is on my team: building strong teams in interdisciplinary visualization courses
While it seems that interdisciplinary collaboration in a visualization course is (theoretically) a very good idea, the practical undergoing is problematic: in a single semester co...
Gitta Domik
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 4 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter
SIGCSE
2006
ACM
131views Education» more  SIGCSE 2006»
15 years 4 months ago
An undergraduate course on software bug detection tools and techniques
The importance of software bug detection tools is high with the constant threat of malicious activity. Companies are increasingly relying on software bug detection tools to catch ...
Eric Larson