Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
The need to reuse the performance macromodels of an analog circuit topology challenges existing regression based modeling techniques. A model of good reusability should have a num...
Learning theory and programs to date are inductively bounded: they can be described as "wind-up toys" which can only learn the kinds of things that their designers envisi...
The paper covers the topic from an e-learning provider's perspective on the basis of practical experience and discussions with corporate and SME partners. In this paper the au...
In order to understand whether conceptual obscurity is truly the reason for the slow uptake of IMS Learning Design (LD), we have initiated an investigation into teachers' unde...
Michael Derntl, Susanne Neumann, Dai Griffiths, Pe...