Error message

Results: 691



#Item
41Measuring the Effectiveness of Error Messages Designed for Novice Programmers Guillaume Marceau Kathi Fisler

Measuring the Effectiveness of Error Messages Designed for Novice Programmers Guillaume Marceau Kathi Fisler

Add to Reading List

Source URL: gmarceau.qc.ca

Language: English - Date: 2011-04-05 10:51:29
42Dependability Analysis of Virtual Memory Systems Lakshmi N. Bairavasundaram Andrea C. Arpaci-Dusseau Remzi H. Arpaci-Dusseau Computer Sciences Department University of Wisconsin, Madison

Dependability Analysis of Virtual Memory Systems Lakshmi N. Bairavasundaram Andrea C. Arpaci-Dusseau Remzi H. Arpaci-Dusseau Computer Sciences Department University of Wisconsin, Madison

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2006-05-26 20:19:40
43Do Not Blame Users for Misconfigurations Tianyin Xu, Jiaqi Zhang, Ryan Huang Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy*

Do Not Blame Users for Misconfigurations Tianyin Xu, Jiaqi Zhang, Ryan Huang Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy*

Add to Reading List

Source URL: sigops.org

Language: English - Date: 2014-02-27 16:46:47
44  	
   	
     	
   Decker	
  Elementary	
  	
  

          Decker  Elementary    

Add to Reading List

Source URL: d39smchmfovhlz.cloudfront.net

Language: English - Date: 2015-06-28 19:33:49
45FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:33:21
46Summary  Crowdsourcing of social cleanliness awareness using twitter and google maps Objectives  The basic objective is to crowdsource and create an awareness campaign on clean and hygienic

Summary Crowdsourcing of social cleanliness awareness using twitter and google maps Objectives The basic objective is to crowdsource and create an awareness campaign on clean and hygienic

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-07-06 00:44:38
47The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
48Adept Status Codes for Embedded Products

Adept Status Codes for Embedded Products

Add to Reading List

Source URL: www1.adept.com

Language: English - Date: 2013-10-02 05:40:26
49research highlights DOI: 8 7 Technical Perspective Corralling Crowd Power

research highlights DOI: 8 7 Technical Perspective Corralling Crowd Power

Add to Reading List

Source URL: hci.stanford.edu

Language: English - Date: 2015-07-25 19:18:08
50ERRORMAIL(8zm)  ERRORMAIL(8zm) NAME errormail − zmailer error message transport agent

ERRORMAIL(8zm) ERRORMAIL(8zm) NAME errormail − zmailer error message transport agent

Add to Reading List

Source URL: www.zmailer.org

Language: English - Date: 2006-12-13 14:24:36