Sciweavers

118 search results - page 6 / 24
» The Myth of the Computer Revolution
Sort
View

Publication
232views
16 years 7 months ago
Myths about Congestion Management in High Speed Networks
Weaknesses in several recently proposed ideas about congestion control and avoidance in high-speed netwroks are identified. Both sides of the debate concerning prior reservation of...
Raj Jain
ICDCSW
2007
IEEE
15 years 3 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
NSDI
2008
14 years 11 months ago
IRBs and Security Research: Myths, Facts and Mission Creep
Having decided to focus attention on the "weak link" of human fallibility, a growing number of security researchers are discovering the US Government's regulations ...
Simson L. Garfinkel
CACM
2004
102views more  CACM 2004»
14 years 9 months ago
The field of programmers myth
s (theory, abstraction, and design) [2]. They put programming as a subpart of the design component of most of the nine areas, especially algorithms and software engineering. Their ...
Peter J. Denning
ICSE
2005
IEEE-ACM
15 years 9 months ago
Some myths of software engineering education
Based on many years of teaching software engineering, I present a number of lessons I have learned over the years. I do so in the form of a series of myths, the reverse of which c...
Hans van Vliet