Sciweavers

2139 search results - page 36 / 428
» Distributed computing and computer security education
Sort
View
CCS
2007
ACM
15 years 3 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
SIGCSE
2008
ACM
111views Education» more  SIGCSE 2008»
14 years 9 months ago
Improving computer science diversity through summer camps
Summer camps offer a ripe opportunity for increasing computer science diversity. This panel provides several examples of summer camps that specifically recruit from traditionally ...
Dennis P. Groth, Helen H. Hu, Betty Lauer, Hwajung...
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 9 months ago
A computational approach to the covert and overt deployment of spatial attention
Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of th...
Jérémy Fix, Nicolas P. Rougier, Fr&e...
CN
2007
80views more  CN 2007»
14 years 9 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai