Sciweavers

51692 search results - page 10284 / 10339
» it 2008
Sort
View
SCN
2008
Springer
136views Communications» more  SCN 2008»
13 years 10 months ago
An efficient data structure for network anomaly detection
Abstract-- Despite the rapid advance in networking technologies, detection of network anomalies at high-speed switches/routers is still far from maturity. To push the frontier, two...
Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 10 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
SCN
2008
Springer
140views Communications» more  SCN 2008»
13 years 10 months ago
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
The Multimedia Broadcast Multicast Service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved M...
Simone Teofili, Michele Di Mascolo, Cristina Basil...
SIGCSE
2008
ACM
143views Education» more  SIGCSE 2008»
13 years 10 months ago
Test-driven learning in early programming courses
Coercing new programmers to adopt disciplined development practices such as thorough unit testing is a challenging endeavor. Test-driven development (TDD) has been proposed as a s...
David Janzen, Hossein Saiedian
SIGCSE
2008
ACM
119views Education» more  SIGCSE 2008»
13 years 10 months ago
Exploring studio-based instructional models for computing education
While the demand for college graduates with computing skills continues to rise, such skills no longer equate to mere programming skills. Modern day computing jobs demand design, c...
Christopher D. Hundhausen, N. Hari Narayanan, Mart...
« Prev « First page 10284 / 10339 Last » Next »