Sciweavers

2250 search results - page 83 / 450
» Authorizing applications in singularity
Sort
View
WWW
2001
ACM
15 years 10 months ago
An Investigation of XML-technologies for Infrastructures for Web-based Virtual Courses
The emergence of XML has lead to a change in the development style for Web sites. XML's advantages, such as the separation of content and presentation, or the possibility to ...
Claus Pahl
ICNS
2009
IEEE
15 years 4 months ago
Psychometric and Evidentiary Approaches to Simulation Assessment in Packet Tracer Software
Packet Tracer is a comprehensive instructional software application for teaching skills and concepts associated with computer networking. In addition to a wide range of simulation...
Dennis C. Frezzo, John T. Behrens, Robert J. Misle...
ICALT
2006
IEEE
15 years 3 months ago
Adapting SME Learning Environments for Adaptivity
There is a genuine demand for personalization and guidance in learning systems, as well as in general commercial learning systems for the WWW, and further, for the new, emerging S...
Alexandra I. Cristea, Angelo Wentzler, Egbert Heuv...
IJCNN
2000
IEEE
15 years 2 months ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang
ITS
1998
Springer
129views Multimedia» more  ITS 1998»
15 years 2 months ago
Cognitive Measures for Visual Concept Teaching with Intelligent Tutoring Systems
Abstract: This article reports on the application of general cognitive measures to describe and order the knowledge base of radiological images, aimed at the teaching of visual con...
Andrey R. Pimentel, Alexandre I. Direne