Sciweavers

353 search results - page 12 / 71
» The C Hackers Guide
Sort
View
IPPS
2008
IEEE
14 years 1 months ago
Implementing an industrial-strength academic cyberinfrastructure at Purdue University
Purdue University operates one of the largest cycle recovery systems in existence in academia based on the Condor workload management system. This system represents a valuable and...
Preston M. Smith, Thomas J. Hacker, C. X. Song
CLEF
2007
Springer
14 years 1 months ago
GeoCLEF 2007: The CLEF 2007 Cross-Language Geographic Information Retrieval Track Overview
GeoCLEF ran as a regular track for the second time within the Cross Language Evaluation Forum (CLEF) 2007. The purpose of GeoCLEF is to test and evaluate cross-language geographic ...
Thomas Mandl, Fredric C. Gey, Giorgio Maria Di Nun...
INFOSECCD
2006
ACM
14 years 1 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
CLEF
2006
Springer
13 years 11 months ago
GeoCLEF 2006: The CLEF 2006 Cross-Language Geographic Information Retrieval Track Overview
After being a pilot track in 2005, GeoCLEF advanced to be a regular track within CLEF 2006. The purpose of GeoCLEF is to test and evaluate cross-language geographic information ret...
Fredric C. Gey, Ray R. Larson, Mark Sanderson, Ker...
IJNSEC
2007
109views more  IJNSEC 2007»
13 years 7 months ago
SeReRoM: Secured Reliable Routing Scheme for Multicasting
This paper proposes a multipath routing scheme SeReRoM for a multicast group communication with a single source and multiple destinations. SeReRoM provides an environment that tac...
Rajavelu Srinivasan, V. Vaidehi, K. N. Srivathsan,...