Sciweavers

6164 search results - page 75 / 1233
» Teaching Computer Security
Sort
View
134
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
144
Voted
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 2 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
135
Voted
CCGRID
2001
IEEE
15 years 6 months ago
Cluster Computing in the Classroom: Topics, Guidelines, and Experiences
- With the progress of research on cluster computing, more and more universities have begun to offer various courses covering cluster computing. A wide variety of content can be ta...
Amy W. Apon, Rajkumar Buyya, Hai Jin, Jens Mache
150
Voted
AIED
2005
Springer
15 years 8 months ago
Teaching the evolution of behavior with SuperDuperWalker
SuperDuperWalker is a software-based framework for experiments on the evolution of locomotion. It simulates the behavior of evolving agents in a 3D physical simulation environment ...
Lee Spector, Jon Klein, Kyle Harrington, Raymond C...