2008 - May
Technology based outsourcing K-12 mathematics and science teaching
by M. O. Thirunarayanan
The author suggests that the teaching of mathematics and science in K-12 schools be outsourced to teachers in other countries whose students achieve better in mathematics and science. He outlines the advantages of using telecommunications technologies to outsource the teaching of mathematics and science.
Making sense of nonsense: writing advice from Lewis Carroll and the Jabberwocky
by Philip Yaffe
May 2008The absolute, unalterable, incontestable hallmark of a good expository (non-fiction) text is its clarity. ...
Scarce resources in computing
by Espen Andersen
May 2008How we organize computing - and innovate with it - is shaped by what at any time is the most scarce resource. In the early days of computing, processing (and, ...
SC08 broader engagement offers mentoring and travel assistance grants
by Kathryn L. Kelley
May 2008Austin, TX Interested in understanding what supercomputing means? Want to learn how next-generation computing, networking and storage technologies help to solve our worlds challenges and problems? ...
Elliptic curve cryptography
by Vivek Kapoor, Vivek Sonny Abraham, Ramesh Singh
May 2008This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards. ...
Four short reviews of current software engineering books of interest
by Ross Gagliano
May 2008Associate Editor Ross Gagliano offers four Short Reviews of current Software Engineering books of interest. ...
Preface by Arun Tripathi to Jeff Malpas' 'The Non-Autonomy of the Virtual'
by Arun Tripathi
May 2008Australian philosopher Jeff Malpas, author of Place and Experience, argues in his Ubiquity paper The non-autonomy of the virtual: philosophical reflections on contemporary virtuality that the virtual is not autonomous ...
Software Columbo: What can a bumbling, inarticulate Los Angeles cop teach us about effective communication?
by Philip Yaffe
May 2008Decade after decade, perhaps the most popular type of television program has been the detective story, the traditional "who dun it?" , presumably because people enjoy being held in suspense. ...
The non-autonomy of the virtual: philosophical reflections on contemporary virtuality
by Jeff Malpas
May 2008Much contemporary talk of virtual 'worlds' proceeds as if the virtual could somehow be considered as in competition with or as an alternative to the world of the 'nonvirtual' or ...
A prototype design for DRM based credit card transaction in E-commerce
by Sanjay Banerjee, Sunil Karforma
May 2008In E-Commerce credit cards gained popularity as a sophisticated payment mechanism. With the increase in credit card use on web, credit card fraud has gone up dramatically. ...
Software-Implemented Fault Detection Approaches
by Goutam Kumar Saha
May 2008A comparative study on various software-implemented fault detection approaches has been briefly described in a tabular form ...
New technique for fixing an Ethernet IPv6 address using the fedoracore operating system
by A. Aaroud, A. Jamali, N. Najib
May 2008During the course to deploy Ipv6, we found several critical implementation and operational issues which distract user and possibly prevent wide deployment of Ipv6. Among the problems we noticed stateless ...