Sciweavers

423 search results - page 69 / 85
» Specifying Strategies for Exercises
Sort
View
CHI
2011
ACM
14 years 1 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
ICSE
2011
IEEE-ACM
14 years 1 months ago
Leveraging software architectures to guide and verify the development of sense/compute/control applications
A software architecture describes the structure of a computing system by specifying software components and their interactions. Mapping a software architecture to an implementatio...
Damien Cassou, Emilie Balland, Charles Consel, Jul...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 4 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ICWE
2004
Springer
15 years 3 months ago
Authoring and Dynamic Generation of Adaptive E-courses
Abstract. Adaptive hypermedia constitutes a pretty rich resource for developing web-based courses. With the aim of dynamically generating adaptive ecourses, we have developed the T...
Rosa M. Carro, Manuel Freire, Estefanía Mar...
SODA
1998
ACM
99views Algorithms» more  SODA 1998»
14 years 11 months ago
On-Line File Caching
Consider the following file caching problem: in response to a sequence of requests for files, where each file has a specified size and retrieval cost, maintain a cache of files of ...
Neal E. Young