Sciweavers

AINA
2004
IEEE
15 years 8 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
AH
2006
Springer
15 years 8 months ago
Towards Formalising Adaptive Behaviour Within the Scope of E-Learning
As there are a lot of approaches and projects within the area of adaptive e-learning, several theoretical models have been developed in the last 15 years. Against this background, ...
Felix Mödritscher
AINA
2004
IEEE
15 years 8 months ago
MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks
This paper presents a novel effective scheme of configuring Wireless Personal Area Networks (WPANs), called Master-driven Connection Control (MaCC). WPANs are based on a new wirel...
Makoto Takizawa, Hiroto Aida, Masato Saito, Yoshit...
AINA
2004
IEEE
15 years 8 months ago
Rich Metadata Searches Using the JXTA Content Manager Service
With the development of networking technologies and the advent of the peer-to-peer computing paradigm, distributed file-sharing systems like Gnutella are becoming prevalent over t...
Xin Xiang, Yuanchun Shi, Ling Guo
AH
2006
Springer
15 years 8 months ago
The Effect of Adapting Feedback Generality in ITS
Intelligent tutoring systems achieve much of their success by adapting to individual students. One potential avenue for personalization is feedback generality. This paper presents ...
Brent Martin, Antonija Mitrovic