Sciweavers

6164 search results - page 1087 / 1233
» Teaching Computer Security
Sort
View
203
Voted
IPPS
2006
IEEE
15 years 9 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
140
Voted
CSCW
2012
ACM
13 years 11 months ago
Designing a social network to support the independence of young adults with autism
Independence is key to a successful transition to adulthood for individuals with autism. Social support is a crucial factor for achieving adaptive self-help life skills. In this p...
Hwajung Hong, Jennifer G. Kim, Gregory D. Abowd, R...
CAV
2012
Springer
243views Hardware» more  CAV 2012»
13 years 6 months ago
SPT: Storyboard Programming Tool
elor Thesis: Demand Driven Abstraction Refinement Kendriya Vidyalaya ONGC, Dehradun, Uttaranchal INDIA All India Senior Secondary Examination, May 2004 • Secured 97.6 % marks in...
Rishabh Singh, Armando Solar-Lezama
DSRT
2006
IEEE
15 years 9 months ago
Grid-enabling FIRST: Speeding Up Simulation Applications Using WinGrid
The vision of grid computing is to make computational power, storage capacity, data and applications available to users as readily as electricity and other utilities. Grid infrast...
Navonil Mustafee, Anders Alstad, Bjorn Larsen, Sim...
131
Voted
WAN
1998
Springer
15 years 7 months ago
The NRW Metacomputing Initiative
In this paper the Northrhine-Westphalian metacomputing initiative is described. We start by discussing various general aspects of metacomputing and explain the reasons for founding...
Uwe Schwiegelshohn, Ramin Yahyapour
« Prev « First page 1087 / 1233 Last » Next »