Sciweavers

14704 search results - page 201 / 2941
» computing 2007
Sort
View
124
Voted
SEC
2004
15 years 4 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
108
Voted
ANNALS
2004
56views more  ANNALS 2004»
15 years 3 months ago
Computer Sciences at Purdue University-1962 to 2000
Purdue University established the first academic department of computer sciences in 1962. The events, starting in 1959, leading to its establishment are chronicled, and then its f...
John R. Rice, Saul Rosen
COMSUR
2007
101views more  COMSUR 2007»
15 years 3 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
PDCN
2004
15 years 4 months ago
CS_LITE: A lightweight computational steering system
Computational steering environments (CSEs) allow users to interact with applications executing in batch mode. Interaction with an application includes viewing intermediate results...
Silvia M. Figueira, Sonia Bui
FECS
2007
184views Education» more  FECS 2007»
15 years 4 months ago
Collaboratory: An Open Source Teaching and Learning Facility for Computer Science and Engineering Education
In this paper we present an innovative prototype Open Source Teaching/Learning Collaboratory created at UC Merced that will provide the foundation for offering the vast majority of...
Jeff Wright, Stefano Carpin, Alberto Cerpa, German...