Sciweavers

15379 search results - page 2977 / 3076
» Protecting users from
Sort
View
SIGUCCS
2003
ACM
14 years 3 months ago
What's old is new again: training is the information technology constant
This paper is an account of some of the more instructive experiences we gained as we sought to ensure that our information technology training programs kept pace with a fast chang...
George Bradford
SIGUCCS
2003
ACM
14 years 3 months ago
Using a course management system to create a training course for student employees
The User Services unit of Information Technologies at the University of Delaware operates nine public computing facilities and employs about 150 students who work as assistants in...
Cindy Guerrazzi, Kate Webster
ASIACRYPT
2003
Springer
14 years 3 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
DSVIS
2003
Springer
14 years 3 months ago
Calligraphic Interfaces: Mixed Metaphors for Design
CAD systems have yet to become usable at the early stages of product ideation, where precise shape definitions and sometimes even design intentions are not fully developed. To over...
João Paulo Pereira, Joaquim A. Jorge, Vasco...
ECOOP
2003
Springer
14 years 3 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
« Prev « First page 2977 / 3076 Last » Next »