Sciweavers

12194 search results - page 2307 / 2439
» Numberings Optimal for Learning
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 10 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
DIGRA
2005
Springer
15 years 10 months ago
Research as Design-Design as Research
This paper details a research methodology that emerged during an inquiry into game design aimed at promoting conceptual learning in physics. The methodology, Research as DesignDes...
Andrew Stapleton
FOSSACS
2005
Springer
15 years 10 months ago
Branching Cells as Local States for Event Structures and Nets: Probabilistic Applications
We study the concept of choice for true concurrency models such as prime event structures and safe Petri nets. We propose a dynamic variation of the notion of cluster previously in...
Samy Abbes, Albert Benveniste
PODC
2004
ACM
15 years 10 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
SIGCSE
2004
ACM
101views Education» more  SIGCSE 2004»
15 years 10 months ago
Effective features of algorithm visualizations
Many algorithm visualizations have been created, but little is known about which features are most important to their success. We believe that pedagogically useful visualizations ...
Purvi Saraiya, Clifford A. Shaffer, D. Scott McCri...
« Prev « First page 2307 / 2439 Last » Next »