Sciweavers

2139 search results - page 369 / 428
» Distributed computing and computer security education
Sort
View
TIM
2010
129views Education» more  TIM 2010»
13 years 2 months ago
Experimental Evaluation of Feedback Modalities for Five Teleoperation Tasks
A distributed telerobotic system is proposed based on a master-arm station that is interconnected by a computer network to a slave-arm station. The distributed telerobotic system i...
Mayez A. Al-Mouhamed, Mohammad Nazeeruddin, S. M. ...
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
ACSAC
2004
IEEE
13 years 11 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
SIGCSE
1990
ACM
126views Education» more  SIGCSE 1990»
13 years 11 months ago
A philosophy and example of CS-1 programming projects
This paper presents a philosophy underlying CS-1 programming projects, and illustrates this philosophy with a concrete example. Integral to the philosophy is the use of Ada packag...
Richard E. Pattis
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 7 months ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002