Sciweavers

3295 search results - page 199 / 659
» Using Technologies to Improve E-Learning
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
122
Voted
OTM
2007
Springer
15 years 10 months ago
Bittella: A Novel Content Distribution Overlay Based on Bittorrent and Social Groups
This paper presents Bittella: a new social network for content distribution based on Peer-to-Peer technologies. It exploits the common interests of the users in order to create soc...
Rubén Cuevas Rumín, Carmen Guerrero,...
108
Voted
ICALT
2005
IEEE
15 years 10 months ago
Learning from the Pitfalls of a Case Sharing Web
Using cases for teaching and learning has received growing attention in teacher training programs. This project intends to build a web forum for student teachers to discuss their ...
Shihkuan Hsu
125
Voted
ICCAD
2005
IEEE
199views Hardware» more  ICCAD 2005»
15 years 10 months ago
FinFETs for nanoscale CMOS digital integrated circuits
Suppression of leakage current and reduction in device-todevice variability will be key challenges for sub-45nm CMOS technologies. Non-classical transistor structures such as the ...
Tsu-Jae King
ECML
2005
Springer
15 years 10 months ago
A SAT-Based Version Space Algorithm for Acquiring Constraint Satisfaction Problems
Constraint programming is rapidly becoming the technology of choice for modelling and solving complex combinatorial problems. However, users of this technology need significant ex...
Christian Bessière, Remi Coletta, Fré...