A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
This paper addresses the on-going work of integrating supply chain research into the graduate curriculum in the form of a Supply Chain Modeling course. This course integrates rese...
Ricki G. Ingalls, Mario Cornejo, Chinnatat Methapa...
This paper contributes to the ongoing dialogue about the inclusion of ethics content within computing education. It presents a brief exposition of the challenges facing the teachi...
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...