Sciweavers

2421 search results - page 24 / 485
» Message from the Co-Chairs
Sort
View
SIGCSE
2008
ACM
131views Education» more  SIGCSE 2008»
13 years 7 months ago
Compiler error messages: what can help novices?
Novices find it difficult to understand and use compiler error messages. It is useful to refine this observation and study the effect of different message styles on how well and q...
Marie-Hélène Nienaltowski, Michela P...
HPCA
1998
IEEE
14 years 49 min ago
Exploiting Two-Case Delivery for Fast Protected Messaging
We propose and evaluate two complementary techniques to protect and virtualize a tightly-coupled network interface in a multicomputer. The techniques allow efficient, direct appli...
Kenneth Mackenzie, John Kubiatowicz, Matthew Frank...
IAAI
2003
13 years 9 months ago
Searching for Hidden Messages: Automatic Detection of Steganography
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...
ICITS
2009
13 years 5 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
COMPSAC
1998
IEEE
14 years 6 hour ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi