Sciweavers

673 search results - page 107 / 135
» Authoring of Adaptive and Adaptable Hypermedia
Sort
View
90
Voted
ECTEL
2007
Springer
15 years 4 months ago
Mobile Social Software with Context Awareness and Data Uncertainty for Technology-Enhanced Learning
Mobile computing technologies and social software have given new challenges to technology-enhanced learning. Simple e-learning system personalization, adaptation and authoring beco...
Yiwei Cao
87
Voted
ERCIMDL
2007
Springer
115views Education» more  ERCIMDL 2007»
15 years 4 months ago
The Semantic GrowBag Algorithm: Automatically Deriving Categorization Systems
Using keyword search to find relevant objects in digital libraries often results in way too large result sets. Based on the metadata associated with such objects, the faceted sear...
Jörg Diederich, Wolf-Tilo Balke
OTM
2007
Springer
15 years 4 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
108
Voted
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
15 years 3 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
CHI
2010
ACM
15 years 3 months ago
Steadied-bubbles: combining techniques to address pen-based pointing errors for younger and older adults
Tablet PCs are gaining popularity but many older adults still struggle with pointing, particularly with two error types: missing, landing and lifting outside the target bounds; an...
Karyn Moffatt, Joanna McGrenere