Sciweavers

1209 search results - page 78 / 242
» Universal Algebra and Computer Science
Sort
View
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
SIGCSE
2009
ACM
127views Education» more  SIGCSE 2009»
15 years 6 months ago
A history of computing course with a technical focus
Many courses on the history of computing are designed for a general student audience, and as such, include fewer technical details than one might find in a typical CS course. Whi...
Geoffrey M. Draper, Robert R. Kessler, Richard F. ...
CIE
2005
Springer
15 years 5 months ago
Recursion and Complexity
1 and 2, and in the last Section 4 of this abstract I will outline very briefly some conclusions about recursion and complexity which I believe that they support. 1 Partial Algebr...
Yiannis N. Moschovakis
SIGCSE
2008
ACM
211views Education» more  SIGCSE 2008»
14 years 11 months ago
Cluster computing for web-scale data processing
In this paper we present the design of a modern course in cluster computing and large-scale data processing. The defining differences between this and previously published designs...
Aaron Kimball, Sierra Michels-Slettvet, Christophe...
EDUTAINMENT
2006
Springer
15 years 3 months ago
Trans-disciplinary Avenues in Education: Computing and Art
In this paper we report on an interdisciplinary course "Computing and Art" taught at the Sabanci University, Istanbul for the first time in fall of 2004. We also present...
Selim Balcisoy, Elif E. Ayiter