Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
: User generated content published via weblogs (also known as blogs) has gained importance in the last years, and the number of globally available weblogs increases. However, a lar...
Abstract: This paper describes a Java-based framework for developing componentbased software systems supporting adaptation with logic laws and considering component interactions as...
Enrico Oliva, Antonio Natali, Alessandro Ricci, Mi...
: Recently Web Based Training (WBT) starts to be widely used as a new way of teaching. Unfortunately, this mode of teaching imposes new requirements and constraints. It has made th...
Abdelhak Aqqal, Christoph Rensing, Ralf Steinmetz,...
: The contribution of this paper is twofold. First we investigate the use of the confusion matrices in order to get some insight to better define perceptual zoning for character re...
Cinthia Obladen de Almendra Freitas, Luiz S. Olive...
: Authoring in adaptive educational hypermedia environment is complex activity. In order to promote a wider application of this technology, the teachers and course designers need s...
: Due to a shift in the marketing focus from mass to micro markets, the importance of one-to-one communication in advertising has increased. Interactive media provide possible answ...
: Mass digitization of document collections with further processing and semantic annotation is an increasing activity among libraries and archives at large for preservation, browsi...