Sciweavers

1564 search results - page 157 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
OOPSLA
1992
Springer
15 years 8 months ago
Concurrency Annotations
JAC is a Java extension for high-level concurrent programming, meant to hide the notions of threads and synchronization statements from the programmer. Putting into practice the c...
Klaus-Peter Löhr
OOPSLA
1990
Springer
15 years 8 months ago
Mixin-based Inheritance
The diverse inheritance mechanisms provided by Smalltalk, Beta, and CLOS are interpreted as different uses of a single underlying construct. Smalltalk and Beta differ primarily in...
Gilad Bracha, William R. Cook
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
15 years 1 months ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
15 years 10 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
SASO
2007
IEEE
15 years 10 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...