Sciweavers

6187 search results - page 971 / 1238
» Practical Software Measurement
Sort
View
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 10 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
ECLIPSE
2004
ACM
15 years 10 months ago
JTutor: an Eclipse plug-in suite for creation and replay of code-based tutorials
Programming courses of all levels rely heavily on code examples. Often, to cover non-trivial subjects, it is convenient to present examples in the form of a tutorial. Such tutoria...
Chris Kojouharov, Aleksey Solodovnik, Gleb Naumovi...
PDC
2004
ACM
15 years 10 months ago
Socio-technical walkthrough: designing technology along work processes
How can the documentation of concepts for complex sociotechnical systems, such as the adoption of groupware, be incorporated into practices of PD? Documents are important in suppo...
Thomas Herrmann, Gabriele Kunau, Kai-Uwe Loser, Na...
PDC
2004
ACM
15 years 10 months ago
The impact of participation in information system design: a comparison of contextual placements
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Magnus Irestig, Henrik Eriksson, Toomas Timpka
SIGCSE
2004
ACM
188views Education» more  SIGCSE 2004»
15 years 10 months ago
Buffer pools and file processing projects for an undergraduate data structures course
This paper presents a family of programming projects appropriate to a sophomore-level data structures course, centered around the concept of a buffer pool serving as the access i...
Clifford A. Shaffer