← All posts tagged CS

dk
education CS «This brings me to the Big Idea: Open Social Learning. Imagine a Facebook where the point is to study together, not trade pictures and jokes. Imagine a World of Warcraft where students earn levels and points by helping each other learn. Not a video game that teaches physics; instead, let's create an educational experience that is social and game-like.»
Our Big Idea: Open Social Learning
dk
OS CS Мдя, пропустил релиз нового снапшота barrelfish от 2011-03-01: barrelfish.org
Из нововведений радуют: "Completely revamped message passing system (including bulk transport drivers)." и "the Phoenix MapReduce run-time."
будем посмотреть
dk
education CS "One of the most interesting and ambitious panel discussions at SPLASH 2010 External Link was “Manifesto: a New Educational Programming Language” in which Andrew Black External Link, Kim B. Bruce External Link, and James Noble External Link presented their proposal for a new educational object-oriented programming language called Grace External Link. The idea for Grace came about at ECOOP 2010 External Link in Maribor, Slovenia, when Black, Bruce, Noble, and a set of like-minded computer science teachers grappled with the question, “What are we going to be teaching in CS intro courses in five years?”" cacm.acm.org
dk
OS CS "This white paper provides a tutorial like overview of the fundamental issues that apply to multicore software operating systems implementation for the telecom/ networking space. It starts with consideration of the different generic application processing classes in telecom/networking (e.g. control plane, data plane). It then considers the mapping of these processing requirements to the two primary software processing models for multicore (e.g. SMP, AMP, etc)." eetimes.com

Для даунлода статьи нужен аккаунт на EETimes. Те, кому влом его заводить, могут скачать статью отсюда: dl.dropbox.com
dk
Scheme OS programming CS "Cooperation between independent agents depends upon establishing a degree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer system, a computational mechanism can assure safe cooperation among the system's users by mediating resource access according to desired security policy. Such a mechanism, which is called a security kernel, lies at the heart of many operating systems and programming environments.

I claim that the lambda-calculus can serve as the central component of a simple and flexible security kernel. The present report supports this thesis by motivating and describing such a lambda-calculus-based security kernel and by giving several lines of evidence of the kernel's effectiveness."

A Security Kernel Based on the Lambda Calculus fare.tunes.org
dk
programming CS When hackers leaked thousands of e-mails from the Climatic Research Unit (CRU) at the University of East Anglia in Norwich, UK, last year, global-warming sceptics pored over the documents for signs that researchers had manipulated data. No such evidence emerged, but the e-mails did reveal another problem — one described by a CRU employee named "Harry", who often wrote of his wrestling matches with wonky computer software.

"Yup, my awful programming strikes again," Harry lamented in one of his notes, as he attempted to correct a code analysing weather-station data from Mexico.
nature.com
dk
programming CS Хехе, я сегодня наконец дорвался до разгребания своего 2read листа, посему ещё порция годного спама:
Scalable Reader-Writer Locks research.sun.com
We present three new reader-writer lock algorithms that scale under
high read-only contention. Many previous reader-writer locks suf-
fer significant degradation when many readers attempt to acquire
the lock concurrently, even though they are all allowed to hold the
lock at the same time. In contrast, our locks scale almost perfectly
when there is only read contention on a 4-chip system with a total
of 256 hardware threads.
dk
math CS The P=NP Question and Gödel’s Lost Letter covers historical developments (including the Gödel’s Lost letter), the importance of P=NP and the future of P=NP. This guide is also based on a new blog by the author, located at rjlipton.wordpress.com. Jin-Yi Cai, a Professor in computer science at the University of Wisconsin remarks 'I think it is the single most interesting web blog I have seen on related topics. He has a great insight and wit and beautiful way to see things and explain them.' Richard DeMillo, a professor in computer science at Georgia Tech remarks, 'This is a much needed treatment of great open problem computing.' amazon.com
...
My Book On P=NP Is Now Available rjlipton.wordpress.com
dk
tcpip CS "
Queensland University of Technology researchers are working to test and mitigate the risks of distributed denial-of-service attacks by creating and running an internal testbed. The new dosTF testbed uses eight Linux and Windows-based computers and three VMware servers to create 200 virtual hosts to simulate attacks. Each computer is equipped with two Ethernet cards and is monitored by SNMP messaging, with experimental scenarios recorded in XML format to be later documented and potentially replayed for further experimentation. The experiments were conducted on an internal network instead of on a live system so as not to break international laws, says Queensland researcher Desmond Schmidt. He notes that similar testbeds have been established at the University of Utah and the University of California, Berkeley, but because of their location they are problematic for researchers in the India-Australia region to use. Each of the computers and virtual hosts in the dosTF testbed can be used as an attacker, traffic generator, defender, or vulnerable service, and can be activated using a central command line. Schmidt says the testbed has been successful in two separate denial-of-service attacks."
...
" Researchers involved in the project will in future make use of the testbed for testing mitigation against DDoS attacks as well as formulating defence applications. Another project will identify potential vulnerabilities in the IPv6 protocol in the behaviour of SCADA systems."
computerworld.com.au
dk
OS CS Отличная статейка: The Caernarvon Secure Embedded Operating System
"The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the highest defined level of assurance.
...
This approach facilitated implementation of a formally specified, mandatory security policy providing multi-level security (MLS) suitable for both government agencies and commercial users. The mandatory security policy requires effective authentication of its users that is independent of applications. For this reason, the Caernarvon OS also contains a privacy-preserving, two-way authentication protocol integrated with the Mandatory Security Policy."
dl.dropbox.com

Довольно интересно почитать про секурное ядрышко, запускаемое на smart cards. Жаль только, что IBMовцы сорцы не выложили. :(
dk
SPb CS 23 сентября 2010 года состоится:
Научно-практический семинар – презентация
«Institute of Electrical and Electronics Engineers — The world's leading professional association for the advancement of technology»
Использование on-line электронных научных ресурсов IEEE в научном и учебном процессах современного технического университета

Место проведения: Санкт-Петербургский государственный Политехнический университет.
Адрес: 195251, Санкт-Петербург, Политехническая ул., 29, Главное здание, ауд.141.
Программа: docs.google.com

Будет наверное интересно тем авторам статей, которые хотят в перспективе публиковать работы в IEEE.