Sciweavers

427 search results - page 66 / 86
» Software engineering education: a roadmap
Sort
View
ASWEC
2006
IEEE
14 years 1 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
QSIC
2006
IEEE
14 years 1 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
IUI
2006
ACM
14 years 1 months ago
Are two talking heads better than one?: when should use more than one agent in e-learning?
Recent interest in the use of software character agents raises the issue of how many agents should be used in online learning. In this paper we review evidence concerning the rela...
Hua Wang, Mark H. Chignell, Mitsuru Ishizuka
WACC
1999
ACM
13 years 11 months ago
Virtual environments at work: ongoing use of MUDs in the workplace
In recent years much attention has been paid to networkbased, distributed environments like text-based MUDs and MOOs for supporting collaborative work. Such environments offer a s...
Elizabeth F. Churchill, Sara A. Bly
DRM
2003
Springer
14 years 17 days ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon