Sciweavers

400 search results - page 72 / 80
» What Makes a Problem GP-Hard
Sort
View
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
ITICSE
2006
ACM
14 years 1 months ago
Approaches to teaching the programming languages course: a potpourri
The release of Curriculum 2001 coupled with the increasing importance of the World Wide Web and the changes in pedagogy enabled by new technologies has made the choices about what...
Elizabeth S. Adams, Doug Baldwin, Judith Bishop, J...
SASN
2006
ACM
14 years 1 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
SIGCSE
2005
ACM
146views Education» more  SIGCSE 2005»
14 years 29 days ago
Using image processing projects to teach CS1 topics
As Computer Science educators, we know that students learn more from projects that are fun and challenging, that seem “real” to them, and that allow them to be creative in des...
Richard Wicentowski, Tia Newhall
ISRR
2005
Springer
138views Robotics» more  ISRR 2005»
14 years 27 days ago
One Is Enough!
We postulate that multi-wheel statically-stable mobile robots for operation in human environments are an evolutionarydead end. Robots of this class tall enough to interact meaning...
Tom Lauwers, George Kantor, Ralph L. Hollis