Sciweavers

1323 search results - page 73 / 265
» Updatable Security Views
Sort
View
121
Voted
ICNP
2003
IEEE
15 years 7 months ago
The Temporal and Topological Characteristics of BGP Path Changes
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates ...
Di-Fa Chang, Ramesh Govindan, John S. Heidemann
AH
2008
Springer
15 years 8 months ago
Do Students Trust Their Open Learner Models?
Open learner models (OLM) enable users to access their learner model to view information about their understanding. Opening the learner model to the learner may increase their perc...
Norasnita Ahmad, Susan Bull
PG
1997
IEEE
15 years 6 months ago
Incremental view-dependent multiresolution triangulation of terrain
A view-dependent multiresolution triangulation algorithm is presented for a real-time flythrough. The triangulation of the terrain is generated incrementally onthe-fly during th...
Reinhard Klein, Daniel Cohen-Or, Tobias Hüttn...
102
Voted
ADHOC
2007
91views more  ADHOC 2007»
15 years 2 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
186
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 9 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto