Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
This study investigated the extent to which the social constructivist approach can be applied to the teaching/learning of translation strategies in an e-learning environment. To a...
In this work we want to show the importance of visualization, interfaces and re-design techniques through 3D modeling, animations and VRML in the developing of the simulation game...
To navigate effectively, an autonomous agent must be able to quickly and accurately determine its current location. Given an initial estimate of its position (perhaps based on dea...
Typically, most research and academic institutions own and archive a great amount of objects and research related resources that have been produced, used and maintained over long ...