Sciweavers

2941 search results - page 68 / 589
» The Myth of the Educational Computer
Sort
View
CCS
2005
ACM
14 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
FOSSACS
2004
Springer
14 years 3 months ago
safeDpi: A Language for Controlling Mobile Code
safeDpi is a distributed version of the Picalculus, in which processes are located at dynamically created sites. Parametrised code may be sent between sites using so-called ports, ...
Matthew Hennessy, Julian Rathke, Nobuko Yoshida
CCGRID
2007
IEEE
14 years 4 months ago
Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
While a grid represents a computing infrastructure for cross domain sharing of computational resources, the cyberinfrastructure, proposed by the US NSF Blue – Ribbon advisory pa...
Jie Yin, Junwei Cao, Yuexuan Wang, Lianchen Liu, C...
LISA
2007
14 years 14 days ago
Master Education Programmes in Network and System Administration
We report on and discuss our experiences with teaching Network and System Administration at the level of Masters at Oslo University College and the University of Amsterdam. At our...
Mark Burgess, Karst Koymans
SIGCSE
2003
ACM
141views Education» more  SIGCSE 2003»
14 years 3 months ago
Teaching objects-first in introductory computer science
An objects-first strategy for teaching introductory computer science courses is receiving increased attention from CS educators. In this paper, we discuss the challenge of the obj...
Stephen Cooper, Wanda Dann, Randy Pausch