Sciweavers

701 search results - page 38 / 141
» Comments on
Sort
View
108
Voted
SIGCSE
2003
ACM
125views Education» more  SIGCSE 2003»
15 years 9 months ago
Introducing middle school girls to fault tolerant computing
During summer 2002, we ran a workshop module for a group of 28 eighth-grade girls. Our aim was ambitious: to introduce these students, ages 12 and 13, to computer science by focus...
Paolo A. G. Sivilotti, Murat Demirbas
DIGRA
2003
Springer
15 years 9 months ago
Game Tips as Gifts: Social Interactions and Rational Calculations in Computer Gaming
The authors look at online tip exchanges as parts of gift economies created by the players and designers of console and online role-playing games in Taiwan. A group of experienced...
Chuen-Tsai Sun, Holin Lin, Cheng-Hong Ho
ASIACRYPT
2001
Springer
15 years 8 months ago
Unbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching publi...
Arjen K. Lenstra
127
Voted
EMSOFT
2001
Springer
15 years 8 months ago
Embedded Control: From Asynchrony to Synchrony and Back
Abstract. We propose in this paper a historical perspective of programming issues found in the implementation of control systems, based on the author’s observations for more than...
Paul Caspi
WCRE
2000
IEEE
15 years 8 months ago
Data Reverse Engineering: A Historical Survey
Data reverse engineering is a rapidly growing field which is sometimes misunderstood. In our effort to promote the realization that data reverse engineering is a valuable and esse...
Kathi Hogshead Davis, Peter H. Aiken