A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Research on web mashups and visual languages share an interest in human-centered computing. Both research communities are concerned with supporting programming by everyday, techni...
M. Cameron Jones, Elizabeth F. Churchill, Michael ...
Misconceptions have been identified in many subjects. However, there has been less investigation into students' interest in their misconceptions. This paper presents two indep...
Susan Bull, Andrew Mabbott, Peter Gardner, Tim Jac...
We propose a novel approach for determining if a pair of images match each other under the effect of a highdistortion transformation or non-structural relation. The co-occurrence ...
This paper describes the architecture of the fourth version of the Evolutionary Virtual Agent (EVA). This new light-weight java-based implementation is based on a dynamical rule-b...