Sciweavers

13026 search results - page 2349 / 2606
» Probabilistic Relational Models
Sort
View
IADIS
2004
15 years 5 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
EUMAS
2006
15 years 5 months ago
E*plore-ing the Simulation Design Space
One of the major puzzles in performing multi-agent-based simulations is the validity of their results. Optimisation of simulation parameters can lead to results that can be deceit...
Luis Antunes, Helder Coelho, João Balsa
IADIS
2004
15 years 5 months ago
Problem-Based Learning Method Simulation by PBL Virtual Environment
Problem Based Learning (PBL) is a new teaching-learning method originated from the changes that have occurred in the world economical basis and in the information and communicatio...
Hernane Borges de Barros Pereira, Gabriela Ribeiro...
IADIS
2004
15 years 5 months ago
Designing a personalized E-learning experience using learning objects
This paper aims to provide an experimental vision of the process of course creation using learning objects obtained in the <e-aula> project, a pilot e-learning system concei...
Pilar Sancho, Borja Manero, Baltasar Fernán...
FMOODS
2006
15 years 5 months ago
Mobility Mechanisms in Service Oriented Computing
Abstract. The usual context of service oriented computing is characterized by several services offering the same functionalities, new services that are continuosly deployed and oth...
Claudio Guidi, Roberto Lucchi
« Prev « First page 2349 / 2606 Last » Next »