Search results:
Found 3
Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Now more than ever, as a worldwide STEM community, we need to know what pre-collegiate teachers and students explore, learn, and implement in relation to computer science and engineering education. As computer science and engineering education are not always “stand-alone” courses in pre-collegiate schools, how are pre-collegiate teachers and students learning about these topics? How can these subjects be integrated? Explore six articles in this book that directly relate to the currently hot topics of computer science and engineering education as they tie into pre-collegiate science, technology, and mathematics realms. There is a systematic review article to set the stage of the problem. Following this overview are two teacher-focused articles on professional development in computer science and entrepreneurship venture training. The final three articles focus on varying levels of student work including pre-collegiate secondary students’ exploration of engineering design technology, future science teachers’ (collegiate students) perceptions of engineering, and pre-collegiate future engineers’ exploration of environmental radioactivity. All six articles speak to computer science and engineering education in pre-collegiate forums, but blend into the collegiate world for a look at what all audiences can bring to the conversation about these topics.
physics education --- laboratory activity --- environmental radioactivity --- nuclear engineering experiment --- Web-GIS platform --- scintillator detector --- Android app --- in-situ measurements --- computer science application --- ?-ray spectroscopy --- engineering education --- preservice teacher beliefs --- perceptions --- secondary science --- NGSS --- learner analysis --- K-12 teachers --- science --- technology --- engineering --- mathematics (STEM) education --- engineering design technology --- students’ alternative conceptions --- conceptual change --- conceptual assessment items --- inquiry-based science and technology --- learner-centered pedagogy --- assessment tool --- challenge-based learning --- engineering design process --- student engagement --- online professional development training --- coaching --- computer science education --- computer science --- computer science integration --- pre-collegiate teacher --- K–12 teacher --- science education --- engineering education --- pre-college computing activities --- pre-college engineering activities --- pre-college STEM activities --- K–12 --- literature review --- computing outreach --- engineering outreach --- STEM outreach
Choose an application
The proliferation of powerful but cheap devices, together with the availability of a plethora of wireless technologies, has pushed for the spread of the Wireless Internet of Things (WIoT), which is typically much more heterogeneous, dynamic, and general-purpose if compared with the traditional IoT. The WIoT is characterized by the dynamic interaction of traditional infrastructure-side devices, e.g., sensors and actuators, provided by municipalities in Smart City infrastructures, and other portable and more opportunistic ones, such as mobile smartphones, opportunistically integrated to dynamically extend and enhance the WIoT environment. A key enabler of this vision is the advancement of software and middleware technologies in various mobile-related sectors, ranging from the effective synergic management of wireless communications to mobility/adaptivity support in operating systems and differentiated integration and management of devices with heterogeneous capabilities in middleware, from horizontal support to crowdsourcing in different application domains to dynamic offloading to cloud resources, only to mention a few. The book presents state-of-the-art contributions in the articulated WIoT area by providing novel insights about the development and adoption of middleware solutions to enable the WIoT vision in a wide spectrum of heterogeneous scenarios, ranging from industrial environments to educational devices. The presented solutions provide readers with differentiated point of views, by demonstrating how the WIoT vision can be applied to several aspects of our daily life in a pervasive manner.
Industry 4.0 --- data management --- Internet of Things --- performance analysis --- experimental evaluation --- one-to-one computing educational program --- Mobile Device Management --- Internet of Things --- Processing-in-Memory --- programming paradigm --- Internet of Things --- virtual reality --- body area network --- training simulator --- privacy and security --- internet of things --- very long instruction word (VLIW) --- DSP --- instruction set extension --- interoperability --- Web-of-Things --- semantics --- Internet-of-Things --- registry --- big data analytics --- Internet of Things --- microservices architecture --- microservice-oriented platform --- software defined infrastructure --- heterogeneity --- middleware --- semantic --- ontology --- behaviour --- web-of-things --- privacy leakage detection --- intelligent medical service --- fog computing --- Android --- context information --- fog computing --- internet of things --- mobility --- container --- migration --- CRIU --- pre-copy --- post-copy --- Internet-of-Things --- smart metering --- water consumption --- CubeSats --- internet of things --- medium access control --- nanosatellites --- sensor networks --- wireless access networks
Choose an application
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.
cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a
Listing 1 - 3 of 3 |
Sort by
|
2019 (3)