Sciweavers

4013 search results - page 181 / 803
» computer 2002
Sort
View
166
Voted
AIM
2002
15 years 3 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
140
Voted
LICS
2002
IEEE
15 years 9 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
140
Voted
DC
2007
15 years 3 months ago
On private computation in incomplete networks
Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious...
Amos Beimel
SIGUCCS
2003
ACM
15 years 9 months ago
Marketing computer support services through relationship and training strategies
In 2002, Harvard University's Division of Continuing Education (DCE) expanded its computer lab facility. This expansion allowed DCE to change its previous policy of restricti...
Brandon Bentley, Valerie Dixon, Ilana Rozanes, Pat...
243
Voted

Lab
667views
16 years 1 months ago
Digital Systems and Media Computing Laboratory - DSMC
The Digital Systems and Media Computing Laboratory (DSMC Lab) was established in the end of 2002 and is located in Patras, Greece. DSMC operates under the School of Sciences and Te...