Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Purdue University established the first academic department of computer sciences in 1962. The events, starting in 1959, leading to its establishment are chronicled, and then its f...
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
Computational steering environments (CSEs) allow users to interact with applications executing in batch mode. Interaction with an application includes viewing intermediate results...
In this paper we present an innovative prototype Open Source Teaching/Learning Collaboratory created at UC Merced that will provide the foundation for offering the vast majority of...
Jeff Wright, Stefano Carpin, Alberto Cerpa, German...