Sciweavers

ACMSE
2009
ACM
13 years 9 months ago
Semantic web in eHealth
It is getting harder to extract useful information from the enormous amount of data that is being collected in the medical information systems or eHealth systems due to the distri...
Erdogan Dogdu
ACMSE
2009
ACM
13 years 9 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
ACMSE
2009
ACM
14 years 2 months ago
Educational software packages for the One Laptop Per Child (OLPC) XO laptop
The goal of the One Laptop Per Child program is “to provide children around the world with new opportunities to explore, experiment, and express themselves.” To stay true to t...
Michael Keating
ACMSE
2009
ACM
14 years 2 months ago
Using computer graphics to explore object oriented concepts using C
Most recent graphics courses are what we would call topdown courses. Courses that focus on using graphical packages to implement and teach graphics. The course discussed in this p...
William C. Kreahling
ACMSE
2009
ACM
14 years 3 months ago
Towards policy driven self-configuration of user-centric communication
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to ...
Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Al...
ACMSE
2009
ACM
14 years 6 months ago
The teaching of immunology using educational: gaming paradigms
Educational gaming is an exciting genre of computer programming that attempts to find interesting and compelling ways to teach while also being fun. Research has been conducted to...
Patrick Clements, Jeremy Pesner, Jeremiah Shepherd
ACMSE
2009
ACM
14 years 6 months ago
Ginger: implementing a new Lisp family syntax
In this paper we introduce G-expressions, a new syntax based on the S-expression syntax utilized by most Lisp family languages. We have implemented a new homoiconic language, Ging...
James Dean Palmer
ACMSE
2009
ACM
14 years 6 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
ACMSE
2009
ACM
14 years 6 months ago
FI-based file access predictor
An algorithm is proposed for the purpose of optimizing the availability of files to an operating system prior to their being required during execution by a running system. This al...
Jinsuk Baek, Paul S. Fisher, Mingyung Kwak