Sciweavers

14824 search results - page 2736 / 2965
» Security - Introduction
Sort
View
317
Voted
SIGCSE
2008
ACM
365views Education» more  SIGCSE 2008»
15 years 2 months ago
Computer science olympiad: exploring computer science through competition
Generating interest in specialized areas of Computer Science (CS) is one of the goals of the department of Computer and Information Science at Spelman College as with most departm...
Iretta B. C. Kearse, Charles Hardnett
116
Voted
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
15 years 2 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
126
Voted
SIGECOM
2008
ACM
122views ECommerce» more  SIGECOM 2008»
15 years 2 months ago
On the windfall of friendship: inoculation strategies on social networks
This paper studies a virus inoculation game on social networks. A framework is presented which allows the measuring of the windfall of friendship, i.e., how much players benefit i...
Dominic Meier, Yvonne Anne Oswald, Stefan Schmid, ...
119
Voted
SIGKDD
2008
149views more  SIGKDD 2008»
15 years 2 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
97
Voted
SIGMETRICS
2008
ACM
15 years 2 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
« Prev « First page 2736 / 2965 Last » Next »