Sciweavers

686 search results - page 132 / 138
» Evaluating an interactive learning environment in management...
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
130
Voted
ATAL
2010
Springer
14 years 10 months ago
Virtual world builder toolkit
In this paper we present a system that automatically generates a 3D virtual world from a virtual institution (VI) specification, namely of activities that will take place in the v...
T. Trescak, M. Esteva, I. Rodriguez, J. Morales
RAID
2007
Springer
15 years 3 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
72
Voted
CHI
2005
ACM
15 years 10 months ago
Examining task engagement in sensor-based statistical models of human interruptibility
The computer and communication systems that office workers currently use tend to interrupt at inappropriate times or unduly demand attention because they have no way to determine ...
James Fogarty, Andrew Jensen Ko, Htet Htet Aung, E...
76
Voted
ICADL
2005
Springer
137views Education» more  ICADL 2005»
15 years 3 months ago
A Collaborative Filtering Based Re-ranking Strategy for Search in Digital Libraries
Users of a digital book library system typically interact with the system to search for books by querying on the metadata describing the books or to search for information in the p...
U. Rohini, Vamshi Ambati