Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Embedded systems have become common place in industry and domestic electronics, resulting in the need for educational institutions to teach advanced embedded systems design. Exper...
Michael Callaghan, Jim Harkin, Chris Peters, T. Ma...
The EPGY Theorem-Proving Environment is designed to help students write ordinary mathematical proofs. The system, used in a selection of computer-based proof-intensive mathematics ...
- Effective initiation and execution of IS/T projects and systems has become a critical core competence for many organizations. One key to this is the influence of the senior execu...
: This paper reports research concerning issues involved in adopting a computational dialectics approach to develop a human-computer dialogue system for educational debate. In part...