Sciweavers

215 search results - page 13 / 43
» Computing Branches Out: On Revitalizing Computing Education
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 11 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
DSN
2004
IEEE
13 years 11 months ago
Tolerating Hard Faults in Microprocessor Array Structures
In this paper, we present a hardware technique, called Self-Repairing Array Structures (SRAS), for masking hard faults in microprocessor array structures, such as the reorder buff...
Fred A. Bower, Paul G. Shealy, Sule Ozev, Daniel J...
CHI
2007
ACM
14 years 8 months ago
Tangible programming in the classroom with tern
This interactivity demonstrates Tern, a tangible programming language for middle school and late elementary school students. Tern consists of a collection of wooden blocks shaped ...
Michael S. Horn, Robert J. K. Jacob
CORR
2004
Springer
118views Education» more  CORR 2004»
13 years 7 months ago
Understanding Search Trees via Statistical Physics
We study the random m-ary search tree model (where m stands for the number of branches of the search tree), an important problem for data storage in computer science, using a varie...
Satya N. Majumdar, David S. Dean, Paul L. Krapivsk...
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 7 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta