Sciweavers

2139 search results - page 369 / 428
» Distributed computing and computer security education
Sort
View
TIM
2010
129views Education» more  TIM 2010»
14 years 9 months ago
Experimental Evaluation of Feedback Modalities for Five Teleoperation Tasks
A distributed telerobotic system is proposed based on a master-arm station that is interconnected by a computer network to a slave-arm station. The distributed telerobotic system i...
Mayez A. Al-Mouhamed, Mohammad Nazeeruddin, S. M. ...
ESAS
2007
Springer
15 years 8 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
ACSAC
2004
IEEE
15 years 6 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
SIGCSE
1990
ACM
126views Education» more  SIGCSE 1990»
15 years 6 months ago
A philosophy and example of CS-1 programming projects
This paper presents a philosophy underlying CS-1 programming projects, and illustrates this philosophy with a concrete example. Integral to the philosophy is the use of Ada packag...
Richard E. Pattis
143
Voted
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 2 months ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002