Sciweavers

5838 search results - page 145 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
109
Voted
SIGCSE
1998
ACM
154views Education» more  SIGCSE 1998»
15 years 3 months ago
Napier's chessboard calculator
This paper describes our use of a 1970's era PDP-11/10 to support an hour long module which we have incorporated into our computer organization course for the past few semest...
John A. N. Lee
100
Voted
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 3 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
WISEC
2010
ACM
15 years 3 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
TSE
2008
99views more  TSE 2008»
15 years 3 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...
EDM
2008
169views Data Mining» more  EDM 2008»
15 years 4 months ago
Mining Student Behavior Models in Learning-by-Teaching Environments
This paper discusses our approach to building models and analyzing student behaviors in different versions of our learning by teaching environment where students learn by teaching ...
Hogyeong Jeong, Gautam Biswas