Sciweavers

2795 search results - page 444 / 559
» On recommending
Sort
View
100
Voted
CJ
2007
106views more  CJ 2007»
15 years 23 days ago
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
Kim-Kwang Raymond Choo
86
Voted
IIE
2006
110views more  IIE 2006»
15 years 23 days ago
The Current Situation of Informatics Education in Mongolia
Mongolia started using Information and Communication Technology (ICT) in secondary education relatively late. The computer training and informatics has been included as a subject i...
Uyanga Sambuu
98
Voted
IIE
2006
84views more  IIE 2006»
15 years 23 days ago
Promoting Different Kinds of Learners towards Active Learning in the Web-Based Environment
According to many recent studies the effect of learning style on academic performance has been found to be significant and mismatch between teaching and learning styles causes lear...
Anu Haapala
93
Voted
IPM
2008
90views more  IPM 2008»
15 years 23 days ago
Interactive high-quality text classification
Automatic text classification (TC) is essential for information sharing and management. Its ideal goals are to achieve high-quality TC: (1) accepting almost all documents that sho...
Rey-Long Liu
100
Voted
IJBC
2006
93views more  IJBC 2006»
15 years 23 days ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li