Sciweavers

6164 search results - page 25 / 1233
» Teaching Computer Security
Sort
View
PERCOM
2004
ACM
15 years 9 months ago
Anatomy of a Graduate Ubiquitous/Pervasive Computing Course
This paper presents the author's experience in designing and teaching a graduate level Ubiquitous Computing (Ubicomp) course at Arizona State University. It identifies some o...
S. K. S. Gupta
80
Voted
AH
2000
Springer
15 years 1 months ago
Knowledge Computing Method for Enhancing the Effectiveness of a WWW Distance Education System
Abstract. The ultimate aim of our research is a free, evolutionary, Internetbased, agent-based, long-distance teaching environment for academic English. For this purpose, we are bu...
Alexandra I. Cristea, Toshio Okamoto
CRITIS
2006
15 years 1 months ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
IEEEARES
2010
IEEE
15 years 4 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
AGENTS
2001
Springer
15 years 2 months ago
Tears and fears: modeling emotions and emotional behaviors in synthetic agents
Emotions play a critical role in creating engaging and believable characters to populate virtual worlds. Our goal is to create general computational models to support characters t...
Jonathan Gratch, Stacy Marsella