Sciweavers

3424 search results - page 128 / 685
» Building Diverse Computer Systems
Sort
View
RAID
1999
Springer
14 years 6 days ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
ACMSE
2000
ACM
14 years 9 days ago
CWIC: continuous web image collector
The World Wide Web has emerged as one of the most widely available and diverse information sources of all time, yet the options for acessing this information are limited. This pape...
Quasedra Y. Brown, D. Scott McCrickard
ACMDIS
2008
ACM
13 years 10 months ago
Anchored mobilities: mobile technology and transnational migration
Mobile technologies are deployed into diverse social, cultural, political and geographic settings, and incorporated into diverse forms of personal and collective mobility. We pres...
Amanda Williams, Ken Anderson, Paul Dourish
ENTCS
2008
102views more  ENTCS 2008»
13 years 8 months ago
Encoding Distributed Process Calculi into LMNtal
Towards a unifying model of concurrency, we have designed and implemented LMNtal (pronounced "elemental"), a model and language based on hierarchical graph rewriting tha...
Kazunori Ueda
ECTEL
2009
Springer
13 years 5 months ago
CAMera for PLE
Successful self-regulated learning in a personalized learning environment (PLE) requires self-monitoring of the learner and reflection of learning behaviour. We introduce a tool ca...
Hans-Christian Schmitz, Maren Scheffel, Martin Fri...