In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Bayesian networks are an attractive modeling tool for human sensing, as they combine an intuitive graphical representation with ef?cient algorithms for inference and learning. Ear...
Tanzeem Choudhury, James M. Rehg, Vladimir Pavlovi...
Scaffolding techniques allow human instructors to support novice learners in critical early stages, and to remove that support as expertise grows. This paper describes nAble, an a...
Joseph MacInnes, Stephanie Santosa, Nathan Kronenf...
Tools for parallel systems today range from specification over debugging to performance analysis and more. Typically, they help the programmers of parallel algorithms from the ea...
The original SenseMaker interface for information exploration [2] used tables to present heterogeneous document descriptions. In contrast, printed bibliographies and World Wide We...