Sciweavers

524 search results - page 56 / 105
» Why phishing works
Sort
View
KBSE
2000
IEEE
15 years 4 months ago
Model Checking Programs
The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it eas...
Willem Visser, Klaus Havelund, Guillaume P. Brat, ...
PLILP
1992
Springer
15 years 3 months ago
Unfold/fold Transformations Preserving Termination Properties
The unfold/fold framework constitutes the spine of many program transformation strategies. However, by unrestricted use of folding the target program may terminate less often than...
Torben Amtoft
ITS
2000
Springer
116views Multimedia» more  ITS 2000»
15 years 3 months ago
An Adaptive, Collaborative Environment to Develop Good Habits in Programming
In this paper we discuss how computer supported collaborative learning (CSCL) can be deployed to develop new skills and habits in students at university level. These considerations...
Aurora Vizcaíno, Juan Contreras-Castillo, J...
LREC
2010
134views Education» more  LREC 2010»
15 years 1 months ago
Comparison of Spectral Properties of Read, Prepared and Casual Speech in French
In this paper, we investigate the acoustic properties of phonemes in three speaking styles: read speech, prepared speech and spontaneous speech. Our aim is to better understand wh...
Jean-Luc Rouas, Mayumi Beppu, Martine Adda-Decker
IADIS
2004
15 years 1 months ago
Computer-Mediated Communication: Can we Make it Better?
Computer-mediated communication (CMC) is fundamentally different to face-to-face (FTF) communication. The low bandwidth of CMC filters out important social and contextual cues, wh...
Sanjeet Bhachu, D. Ramanee Peiris, Annalu Waller