Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Proper reuse of learning objects depends both on the amount and quality of attached semantic metadata such as “learning objective”', “related concept”, etc. Manually ...
Paramjeet Singh Saini, Marco Ronchetti, Diego Sona
We introduce a projection based multi-channel restoration method which is useful in cases for which there is no a priori information about the input signal. The method is especial...
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
In this article we discuss potential scenarios of use for mobile media in museums and the challenges they pose. We examine how the characteristics of mobile technology suit the sp...