Sciweavers

2236 search results - page 308 / 448
» Secure Software Design in Practice
Sort
View
CCR
2007
108views more  CCR 2007»
14 years 10 months ago
Very low-cost internet access using KioskNet
Rural Internet kiosks in developing regions can cost-effectively provide communication and e-governance services to the poorest sections of society. A variety of technical and no...
Shimin Guo, Mohammad Hossein Falaki, Earl A. Olive...
CSREASAM
2010
14 years 7 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
PLDI
2012
ACM
13 years 12 days ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
SIGCSE
2008
ACM
143views Education» more  SIGCSE 2008»
14 years 10 months ago
Test-driven learning in early programming courses
Coercing new programmers to adopt disciplined development practices such as thorough unit testing is a challenging endeavor. Test-driven development (TDD) has been proposed as a s...
David Janzen, Hossein Saiedian
ATAL
2003
Springer
15 years 3 months ago
Capturing agent autonomy in roles and XML
A key question in the field of agent-oriented software engineering is how the kind and extent of autonomy owned by computational agents can be appropriately captured. As long as ...
Gerhard Weiß, Michael Rovatsos, Matthias Nic...