Author image not provided
 James P Early

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.13
Citation Count41
Publication count8
Publication years2002-2010
Available for download2
Average downloads per article606.50
Downloads (cumulative)1,213
Downloads (12 Months)94
Downloads (6 Weeks)13
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


8 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 8 of 8
Sort by:

1 published by ACM
March 2010 SIGCSE '10: Proceedings of the 41st ACM technical symposium on Computer science education
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 6,   Downloads (12 Months): 61,   Downloads (Overall): 622

Full text available: PDFPDF
This paper describes "Computational Thinking for the Sciences", a 3-day summer workshop for high school science and mathematics teachers. Our workshop emphasizes the deep connections between the natural sciences, mathematics and computer science through activities and simulation development appropriate for scientific explorations. Teachers were exposed to simulation development in VPython, ...
Keywords: high school science, high school mathematics, k-12 outreach, computational thinking

2 published by ACM
March 2008 SIGCSE '08: Proceedings of the 39th SIGCSE technical symposium on Computer science education
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 7,   Downloads (12 Months): 33,   Downloads (Overall): 591

Full text available: PDFPDF
This paper describes a continuing series of summer workshops hosted by Purdue University entitled "Linking Mathematics and Computer Science." Each is designed to inform and inspire high school teachers of mathematics with an interest in computer science. Originally conceived as an extension of our existing K-12 outreach, our workshop aims ...
Keywords: K-12 outreach, algorithmic thinking, high school mathematics
Also published in:
February 2008  ACM SIGCSE Bulletin - SIGCSE 08: Volume 40 Issue 1, March 2008

3
January 2005
Bibliometrics:
Citation Count: 1

This dissertation presents an analysis of the features of network traffic commonly used in network-based anomaly detection systems. It is an examination designed to identify how the selection of a particular protocol attribute affects performance. It presents a guide for making judicious selections of features for building network-based anomaly detection ...

4
March 2004 CERIAS '04: Proceedings of the 5th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods of determining traffic type rely on the port label carried in the packet header. This method can fail, however, in the ...

5
December 2003 ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 5

General-purpose operating systems provide a rich computing environmentboth to the user and the attacker. The declining cost ofhardware and the growing security concerns of software necessitatea revalidation of the many assumptions made in network servicearchitectures. Enforcing sound design principles while retainingusability and flexibility is key to practical security. Poly2 is ...

6
December 2003 ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 19

Understanding the nature of the information flowing intoand out of a system or network is fundamental to determiningif there is adherence to a usage policy. Traditional methodsof determining traffic type rely on the port label carriedin the packet header. This method can fail, however, in thepresence of proxy servers that ...

7
April 2003 CERIAS '03: Proceedings of the 4th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0


8
December 2002 ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Worms continue to be a leading security threat on the Internet.This paper analyzes several of the more widespreadworms and develops a general life-cycle for them. The life-cycle,from the point of view of the victim host, consistsof four stages: target selection, exploitation, infection, andpropagation. While not all worms fall into this ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us