In many settings Web services are now perceived as the first choice technology to provide neatly encapsulated functionality for Web-based computation. To date, many standards hav...
Dominic Greenwood, Margaret Lyell, Ashok U. Mallya...
Classroom BRIDGE supports activity awareness by facilitating planning and goal revision in collaborative, project-based middle school science. It integrates largescreen and deskto...
Craig H. Ganoe, Jacob P. Somervell, Dennis C. Neal...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
We present an adaptive system for training and teaching. Our system integrates an adaptive training environment and a cooperative environment for exams both accessible via Interne...
Maria Barra, A. Lannaccone, Giuseppina Palmieri, V...