Sciweavers

381 search results - page 28 / 77
» Re-imagining the first year of computing
Sort
View
ICSE
2008
IEEE-ACM
15 years 10 months ago
A teamwork-based approach to programming fundamentals with scheme, smalltalk & java
In October 2004 the University of Lugano in southern Switzerland established a new faculty of informatics. Its founding principles are innovation in teaching and faculty participa...
Michele Lanza, Amy L. Murphy, Romain Robbes, Mirce...
SEMCO
2009
IEEE
15 years 4 months ago
Semantic Image Classification for Medical Videos
Due to rapid advances in video technology and biomedicine, there has been a tremendous growth in the volume of medical video data for recent years. Exploring the full potential of...
Shih-Hsi Liu, Yu Cao, Yili Li, Ming Li, Sanqing Hu
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 4 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
SAC
2010
ACM
15 years 3 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
RE
2009
Springer
15 years 2 months ago
Improving the Exchange of Requirements and Specifications between Business Partners
Increasingly complex supplier-relationships dominate product development, independent of industries and products. Mostly the primary source of risks and later problems is insuffic...
Manuel Reis Monteiro, Christof Ebert, Matthias Rec...