Sciweavers

101 search results - page 15 / 21
» Barriers to Adoption of e-Government
Sort
View
184
Voted
POPL
2002
ACM
16 years 23 days ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...
97
Voted
SIGCOMM
2006
ACM
15 years 6 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
115
Voted
SIGCSE
2010
ACM
187views Education» more  SIGCSE 2010»
15 years 5 months ago
Game-themed programming assignments for faculty: a case study
Despite the proven success of using computer video games as a context for teaching introductory programming (CS1/2) courses, barriers including the lack of adoptable materials, re...
Cinnamon Hillyard, Robin Angotti, Michael Panitz, ...
91
Voted
CHI
2007
ACM
16 years 25 days ago
Localized iterative design for language learning in underdeveloped regions: the PACE framework
Poor literacy remains a decisive barrier to the economic empowerment of many people in the developing world. Of particular importance is literacy in a widely spoken "world la...
Matthew Kam, Divya Ramachandran, Varun Devanathan,...
89
Voted
MOBISYS
2007
ACM
16 years 1 days ago
Wireless wakeups revisited: energy management for voip over wi-fi smartphones
IP based telephony is rapidly gaining acceptance over traditional means of voice communication. Wireless LANs are also becoming ubiquitous due to their inherent ease of deployment...
Yuvraj Agarwal, Ranveer Chandra, Alec Wolman, Para...