As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Our schools have been experiencing three overlapping waves of technology adoption since the mid-1980s: the personal computer lab wave, the online learning wave, and the digital cl...
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
This paper focuses on architecture suitable for largescale simulation system. Based on the scenario of large-scale internet simulation, the grid technology is introduced and a new...