Sciweavers

392 search results - page 73 / 79
» What Have We Not Learned about Teaching Programming
Sort
View
146
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 3 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
TIFS
2008
154views more  TIFS 2008»
15 years 3 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen
121
Voted
FLAIRS
2007
15 years 5 months ago
Finding Data, Knowledge, and Answers on the Semantic Web
Web search engines like Google have made us all smarter by providing ready access to the world's knowledge whenever we need to look up a fact, learn about a topic or evaluate...
Timothy W. Finin, Joel Sachs, Cynthia Sims Parr
IMC
2003
ACM
15 years 8 months ago
On inferring and characterizing internet routing policies
Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although ...
Feng Wang, Lixin Gao
156
Voted
TOOLS
1999
IEEE
15 years 7 months ago
Employing Object Technology to Expose Fundamental Object Concepts
This paper reports on the utilisation of object technology in a university-level course on software development, specifically designed for distance learning, and now enrolling ove...
Mark Woodman, Robert Griffiths, Simon Holland, Hug...