• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 424,206
Next 10 →

Improving email trustworthiness through social-group key authentication

by Vivek Pathak, Danfeng Yao, Liviu Iftode - In Proceedings of the 5th Conference on Email and AntiSpam , 2008
"... The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense against these attacks. Existing proposals for sender authentication either require infrastructural support or break compatib ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
compatibility with existing email infrastructure. We propose, implement, and evaluate social-group key authentication, an incrementally deployable and backward compatible sender authentication mechanism for email. Our solution requires honest majority instead of trust infrastructure or human input

Inside the black box: Raising standards through classroom assessment

by Paul Black, Dylan Wiliam - Phi Delta Kappan , 1998
"... Raising the standards of learning that are achieved through school education is an important national priority. Governments have been vigorous in the last ten years in making changes in pursuit of this aim. National curriculum testing, the development of the GCSE, league tables of school performance ..."
Abstract - Cited by 533 (7 self) - Add to MetaCart
in classrooms. Here, teachers have to manage complicated and demanding situations, channelling the personal, emotional and social pressures amongst a group of 30 or so youngsters in order to help them to learn now, and to become better learners in the future. Standards can only be raised if teachers can tackle

Eliciting self-explanations improves understanding

by Michelene T. H. Chi, Nicholas De Leeuw, Mei-hung Chiu, Christian Lavancher - Cognitive Science , 1994
"... Learning involves the integration of new information into existing knowledge. Generoting explanations to oneself (self-explaining) facilitates that integration process. Previously, self-explanation has been shown to improve the acquisition of problem-solving skills when studying worked-out examples. ..."
Abstract - Cited by 556 (22 self) - Add to MetaCart
Learning involves the integration of new information into existing knowledge. Generoting explanations to oneself (self-explaining) facilitates that integration process. Previously, self-explanation has been shown to improve the acquisition of problem-solving skills when studying worked-out examples

Authentication and Authenticated Key Exchanges

by Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener , 1992
"... We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protoc ..."
Abstract - Cited by 307 (6 self) - Add to MetaCart
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing

Trade Policy and Economic Growth: A Skeptic's Guide to the Cross-National Evidence

by Francisco Rodríguez, Dani Rodrik, Francisco Rodríguez, Dani Rodrik - Macroeconomics Annual 2000, Ben Bemanke and , 2000
"... Andrew Warner for generously sharing their data with us. We are particularly grateful to Ben-David, Frankel, Romer, Sachs, Warner and Romain Wacziarg for helpful e-mail exchanges. We have benefited greatly from discussions in seminars at the University of California at Berkeley, ..."
Abstract - Cited by 1013 (25 self) - Add to MetaCart
Andrew Warner for generously sharing their data with us. We are particularly grateful to Ben-David, Frankel, Romer, Sachs, Warner and Romain Wacziarg for helpful e-mail exchanges. We have benefited greatly from discussions in seminars at the University of California at Berkeley,

A Delay-Tolerant Network Architecture for Challenged Internets

by Kevin Fall , 2003
"... The highly successful architecture and protocols of today’s Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme env ..."
Abstract - Cited by 937 (13 self) - Add to MetaCart
expectations of end-to-end connectivity and node resources. The architecture operates as an overlay above the transport layers of the networks it interconnects, and provides key services such as in-network data storage and retransmission, interoperable naming, authenticated forwarding and a coarse

Why We Twitter: Understanding Microblogging Usage and Communities

by Akshay Java, Tim Finin
"... Microblogging is a new form of communication in which users can describe their current status in short posts distributed by instant messages, mobile phones, email or the Web. Twitter, a popular microblogging tool has seen a lot of growth since it launched in October, 2006. In this paper, we present ..."
Abstract - Cited by 547 (2 self) - Add to MetaCart
Microblogging is a new form of communication in which users can describe their current status in short posts distributed by instant messages, mobile phones, email or the Web. Twitter, a popular microblogging tool has seen a lot of growth since it launched in October, 2006. In this paper, we present

The Protection of Information in Computer Systems

by Jerome H. Saltzer, Michael D. Schroeder , 1975
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections ..."
Abstract - Cited by 815 (2 self) - Add to MetaCart
sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer

Imagined Communities

by Tom Anderson , 1991
"... This is a field report of a three-week experience in Japan, centered on art education in their cultural and social contexts. Beginning with this overarching focus, the themes and patterns that structure this report were emergent, rising from the experience. Those supporting themes are: being in Japa ..."
Abstract - Cited by 802 (5 self) - Add to MetaCart
This is a field report of a three-week experience in Japan, centered on art education in their cultural and social contexts. Beginning with this overarching focus, the themes and patterns that structure this report were emergent, rising from the experience. Those supporting themes are: being

Discovery of Grounded Theory

by Barney G. Glaser, Judith Holton , 1967
"... Abstract: This paper outlines my concerns with Qualitative Data Analysis ’ (QDA) numerous remodelings of Grounded Theory (GT) and the subsequent eroding impact. I cite several examples of the erosion and summarize essential elements of classic GT methodology. It is hoped that the article will clarif ..."
Abstract - Cited by 2485 (12 self) - Add to MetaCart
will clarify my concerns with the continuing enthusiasm but misunderstood embrace of GT by QDA methodologists and serve as a preliminary guide to novice researchers who wish to explore the fundamental principles of GT. Key words: grounded theory, qualitative data analysis, constant comparative method
Next 10 →
Results 1 - 10 of 424,206
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University