Sciweavers

325 search results - page 9 / 65
» ideas 2002
Sort
View
50
Voted
FIRSTMONDAY
2002
84views more  FIRSTMONDAY 2002»
14 years 10 months ago
Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent `Use' at one end to `Cyberterrorism' at the other. Rejecting th...
Maura Conway
PUC
2002
90views more  PUC 2002»
14 years 9 months ago
Data Structures in the Design of Interfaces
Computer science algorithms can be used to improve user interfaces. Using data structures as a source of design ideas, a new interface was constructed for a cellular telephone han...
Gary Marsden, Harold W. Thimbleby, Matt Jones, Pau...
SAC
2002
ACM
14 years 9 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
SIGCSE
2002
ACM
131views Education» more  SIGCSE 2002»
14 years 9 months ago
Integrating a simulation case study into CS2: developing design, empirical and analysis skills
Case studies are widely used in business and medicine to help students learn from the successes and failures of practitioners in the field. This paper discusses the potential bene...
Kay A. Robbins, Catherine Sauls Key, Keith Dickins...
SIGKDD
2002
93views more  SIGKDD 2002»
14 years 9 months ago
A Perspective on Inductive Databases
Inductive databases tightly integrate databases with data mining. The key ideas are that data and patterns (or models) are handled in the same way and that an inductive query lang...
Luc De Raedt