Sciweavers

842 search results - page 147 / 169
» Experimenting with ubiquitous computing technologies in prod...
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
JCAL
2010
101views more  JCAL 2010»
13 years 2 months ago
How East Asian classrooms may change over the next 20 years
Our schools have been experiencing three overlapping waves of technology adoption since the mid-1980s: the personal computer lab wave, the online learning wave, and the digital cl...
Tak-Wai Chan
SIGUCCS
2005
ACM
14 years 1 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
SOUPS
2010
ACM
13 years 11 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
CCGRID
2006
IEEE
14 years 1 months ago
GDSA: A Grid-Based Distributed Simulation Architecture
This paper focuses on architecture suitable for largescale simulation system. Based on the scenario of large-scale internet simulation, the grid technology is introduced and a new...
Suihui Zhu, Zhihui Du, Xudong Chai