CSC 379: Difference between revisions
Jump to navigation
Jump to search
Line 36: | Line 36: | ||
* File Sharing Countermeasures ([[CSC 379 SUM2008:Week 2, Group 4]]) | * File Sharing Countermeasures ([[CSC 379 SUM2008:Week 2, Group 4]]) | ||
= Week 3 pages = | = Week 3 pages == Week 2 pages = | ||
* Markets for Bug Reports ([[CSC 379 SUM2008:Week 3, Group 1]]) | |||
* Costs and Benefits of Malware Countermeasures ([[CSC 379 SUM2008:Week 3, Group 2]]) | |||
* Costs and Benefits Password Regulations ([[CSC 379 SUM2008:Week 3, Group 3]]) | |||
* Bundling Malware ([[CSC 379 SUM2008:Week 3, Group 4]]) | |||
= Week 4 pages = | = Week 4 pages = |
Revision as of 19:15, 23 July 2008
Formatting Resources
Formatting Help Guide from MetaWiki
ACM Technews Search
Professional Codes of Ethics
National Academy of Engineering
Debate Arguments Pyramid
An outline of argument types.
http://blog.createdebate.com/2008/04/07/writing-strong-arguments/
Work Examples
Research Assignment: TBA
Research Assignment Topics
TBD
Week 1 pages
- Netiquette Best Practices: Online Communities (CSC 379 SUM2008:Week 1, Group 1)
- Political Uses of Spam for Special Interests and Influencing Elections (CSC 379 SUM2008:Week 1, Group 2)
- Spam (CSC 379 SUM2008:Week 1, Group 3)
- The Effects of Spam-Countermeasures (CSC 379 SUM2008:Week 1, Group 4)
Week 2 pages
- Turn-it-in and MOSS (CSC 379 SUM2008:Week 2, Group 1)
- Alternative Intellectual Property Models (CSC 379 SUM2008:Week 2, Group 2)
- Search Engines (CSC 379 SUM2008:Week 2, Group 3)
- File Sharing Countermeasures (CSC 379 SUM2008:Week 2, Group 4)
Week 3 pages == Week 2 pages
- Markets for Bug Reports (CSC 379 SUM2008:Week 3, Group 1)
- Costs and Benefits of Malware Countermeasures (CSC 379 SUM2008:Week 3, Group 2)
- Costs and Benefits Password Regulations (CSC 379 SUM2008:Week 3, Group 3)
- Bundling Malware (CSC 379 SUM2008:Week 3, Group 4)
Week 4 pages
TBD
Week 5 pages
TBD