Sciweavers

7596 search results - page 184 / 1520
» Challenges in forensic computing
Sort
View
119
Voted
ESOP
2005
Springer
15 years 9 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
122
Voted
ICALP
1999
Springer
15 years 8 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli
132
Voted
ACMSE
2007
ACM
15 years 7 months ago
Integrating BlackBerry wireless devices into computer programming and literacy courses
In this paper we describe our experience in integrating the RIM's BlackBerry handheld wireless device into programming and literacy courses at the University of Guelph and th...
Qusay H. Mahmoud, Allan Dyer
155
Voted
APCSAC
2007
IEEE
15 years 7 months ago
Exploiting Task Temperature Profiling in Temperature-Aware Task Scheduling for Computational Clusters
Many years of CMOS technology scaling have resulted in increased power densities and higher core temperatures. Power and temperature concerns are now considered to be a primary cha...
Daniel C. Vanderster, Amirali Baniasadi, Nikitas J...
130
Voted
EDUTAINMENT
2006
Springer
15 years 7 months ago
Trans-disciplinary Avenues in Education: Computing and Art
In this paper we report on an interdisciplinary course "Computing and Art" taught at the Sabanci University, Istanbul for the first time in fall of 2004. We also present...
Selim Balcisoy, Elif E. Ayiter