Sciweavers

2941 search results - page 123 / 589
» The Myth of the Educational Computer
Sort
View
SIGCSE
2006
ACM
119views Education» more  SIGCSE 2006»
14 years 4 months ago
Practice what you preach: full separation of concerns in CS1/CS2
We argue that the failure to separate the concerns in CS1 is the leading cause of difficulty in teaching OOP in the first year. We show how the concerns can be detangled and prese...
Hamzeh Roumani
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 10 months ago
Building Computer Network Attacks
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack...
Ariel Futoransky, Luciano Notarfrancesco, Gerardo ...
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 10 months ago
Efficient Computation of Optimal Trading Strategies
Given the return series for a set of instruments, a trading strategy is a switching function that transfers wealth from one instrument to another at specified times. We present ef...
Victor Boyarshinov, Malik Magdon-Ismail
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 10 months ago
A calculus for costed computations
We develop a version of the picalculus Picost where channels are interpreted as resources which have costs associated with them. Code runs under the financial responsibility of own...
Matthew Hennessy
CORR
2006
Springer
78views Education» more  CORR 2006»
13 years 10 months ago
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and ...
Adam J. Slagell, Kiran Lakkaraju, Katherine Luo