• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 21
Next 10 →

Defense Against the Dark Arts

by unknown authors
"... Computer science faculty must attract and retain students by offer-ing innovative courses that spark student interest, yet still teach core, computer science concepts. These efforts have become par-ticularly important as computer science enrollments have declined, thus increasing concerns for attrac ..."
Abstract - Add to MetaCart
Computer science faculty must attract and retain students by offer-ing innovative courses that spark student interest, yet still teach core, computer science concepts. These efforts have become par-ticularly important as computer science enrollments have declined, thus increasing concerns for attracting and retaining students. We describe an innovative course that leverages students ’ interest in computer security issues to attract and retain technically-oriented students. Our initial vision was to offer a course covering computer viruses—a subject that even a novice computer user has some familiarity. To avoid the controversy associated with teaching stu-dents how to write malicious software, we focused the course on techniques for defending against viruses, so we named the course Defense Against the Dark Arts. In teaching the course, we have found the subject matter provides an engaging way to introduce and reinforce many important computer science concepts that other courses often cover, most particularly, the traditional com-piler course. We have taught the course three times at two separate institutions, with a third school soon to follow. The course has been well received by students—completely filling each semester with enrollments that are four to five times greater than the com-piler course. Furthermore, student surveys indicate that the course raises students ’ awareness of computer security while introducing students to important program translation and analysis concepts.

CMU-CyLab-08-007

by Chia-hsin Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, Ahren Studer Adrian Perrig , 2008
"... Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. ..."
Abstract - Add to MetaCart
Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

Taipei TW

by Chia-hsin Owen Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, National Tsing Hua, Taichung Tw
"... Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication of ..."
Abstract - Add to MetaCart
of messages. Unfortunately, in most real-world settings, public key infrastructures (PKI) are uncommon and distributing a secret in a public space is difficult. Thus, it is a challenge to exchange authentic public keys in a scalable, secure, and easy to use fashion. In this paper, we propose GAnGS, a protocol

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

Acknowledgements

by Alejandro Houspanossian, Facultad De Ciencias Exactas , 2006
"... First, I would like to thank to Dimka Karastoyanova and Mariano Cilia for all the fruitful discussions, their guidance and support through the course of this project. Thanks also to Prof. Alejandro Buchmann who sponsored my stay at Technische Universität Darmstadt during the spring of 2004. The spec ..."
Abstract - Add to MetaCart
First, I would like to thank to Dimka Karastoyanova and Mariano Cilia for all the fruitful discussions, their guidance and support through the course of this project. Thanks also to Prof. Alejandro Buchmann who sponsored my stay at Technische Universität Darmstadt during the spring of 2004. The special thanks go to my advisor, Mariano Cilia, who has made all this possible. Finally, I’d like to thank to my family for all these years of support.

Name:

by Vorgelegt Am Januar, Oliver Schneider, Fachbereich Informatik, Oliver Schneider Contents
"... ..."
Abstract - Add to MetaCart
Abstract not found

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Next 10 →
Results 1 - 10 of 21
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University