Sciweavers

6164 search results - page 50 / 1233
» Teaching Computer Security
Sort
View
105
Voted
CHI
2008
ACM
16 years 2 months ago
Where no interface has gone before: what can the phaser teach us about label usage in hci?
Most research on how people represent procedures suggests that control labels are central. However, our data suggest that even moderately-experienced users do not rely on labels t...
Franklin P. Tamborello II, Phillip H. Chung, Micha...
SIGCSE
1999
ACM
123views Education» more  SIGCSE 1999»
15 years 6 months ago
Do we teach the right algorithm design techniques?
Algorithms have cometo be recognizedasthe cornerstone of computing. Surprisingly, there has been little research or discussion of general techniques for designing algorithms. Thou...
Anany Levitin
IASTEDSE
2004
15 years 3 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
129
Voted
ITICSE
2006
ACM
15 years 8 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
AOIS
2003
15 years 3 months ago
I-MINDS: An Agent-Oriented Information System for Applications in Education
Abstract. In this paper, we describe an Intelligent Multiagent Infrastructure for Distributed Systems in Education (or I-MINDS) framework that applies an agent-oriented information...
Leen-Kiat Soh, Xuli Liu, XueSong Zhang, Jameela Al...