Sciweavers

2941 search results - page 4 / 589
» The Myth of the Educational Computer
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
A Complexity View of Markets with Social Influence
: In this paper, inspired by the work of Megiddo on the formation of preferences and strategic analysis, we consider an early market model studied in the field of economic theory, ...
Xi Chen, Shang-Hua Teng

Publication
232views
15 years 6 months ago
Myths about Congestion Management in High Speed Networks
Weaknesses in several recently proposed ideas about congestion control and avoidance in high-speed netwroks are identified. Both sides of the debate concerning prior reservation of...
Raj Jain
ICDCSW
2007
IEEE
14 years 2 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
NSDI
2008
13 years 10 months ago
IRBs and Security Research: Myths, Facts and Mission Creep
Having decided to focus attention on the "weak link" of human fallibility, a growing number of security researchers are discovering the US Government's regulations ...
Simson L. Garfinkel
CACM
2004
102views more  CACM 2004»
13 years 7 months ago
The field of programmers myth
s (theory, abstraction, and design) [2]. They put programming as a subpart of the design component of most of the nine areas, especially algorithms and software engineering. Their ...
Peter J. Denning