Sciweavers

20 search results - page 4 / 4
» How to Share and Reuse Learning Resources: The ARIADNE Exper...
Sort
View
COMPSEC
2006
141views more  COMPSEC 2006»
13 years 5 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
FASE
2006
Springer
13 years 9 months ago
Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude
This paper describes the application of the Real-Time Maude tool to the formal specification and analysis of the CASH scheduling algorithm and its suggested modifications. The CASH...
Peter Csaba Ölveczky, Marco Caccamo
SIGUCCS
2000
ACM
13 years 10 months ago
Training... A Key to Better Help Desk Consultants
The quality of student consultants and their development through training and education are major factors in determining long-term effectiveness of university Help Desk. To hire a...
Anna Maria Perez, Andrea J. Moore
CIKM
2008
Springer
13 years 7 months ago
A sparse gaussian processes classification framework for fast tag suggestions
Tagged data is rapidly becoming more available on the World Wide Web. Web sites which populate tagging services offer a good way for Internet users to share their knowledge. An in...
Yang Song, Lu Zhang 0007, C. Lee Giles
ITICSE
2006
ACM
13 years 11 months ago
Approaches to teaching the programming languages course: a potpourri
The release of Curriculum 2001 coupled with the increasing importance of the World Wide Web and the changes in pedagogy enabled by new technologies has made the choices about what...
Elizabeth S. Adams, Doug Baldwin, Judith Bishop, J...