Sciweavers

2139 search results - page 41 / 428
» Distributed computing and computer security education
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
GCC
2003
Springer
15 years 2 months ago
Research and Design of Remote Education System Based on CSCW
Guided by the cooperation theory, this paper puts forward an interactive and cooperative learning environment design that is based on the self-learning mode and cooperative learnin...
Chunzhi Wang, Miao Shao, Jing Xia, Huachao Chen
GROUP
2009
ACM
15 years 4 months ago
Two peers are better than one: aggregating peer reviews for computing assignments is surprisingly accurate
Scientiï¬c peer review, open source software development, wikis, and other domains use distributed review to improve quality of created content by providing feedback to the workâ...
Ken Reily, Pam Ludford Finnerty, Loren G. Terveen
HOTOS
2003
IEEE
15 years 3 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 8 months ago
Adding a referee to an interconnection network: What can(not) be computed in one round
Abstract—In this paper we ask which properties of a distributed network can be computed from a few amount of local information provided by its nodes. The distributed model we con...
Florent Becker, Martín Matamala, Nicolas Ni...