Sciweavers

1033 search results - page 19 / 207
» Properties of Exercise Strategies
Sort
View
ICDCSW
2003
IEEE
15 years 3 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
MSE
2003
IEEE
120views Hardware» more  MSE 2003»
15 years 3 months ago
A Collaborative Environment for Remote Experimentation
Embedded systems have become common place in industry and domestic electronics, resulting in the need for educational institutions to teach advanced embedded systems design. Exper...
Michael Callaghan, Jim Harkin, Chris Peters, T. Ma...
LPAR
2001
Springer
15 years 2 months ago
A Computer Environment for Writing Ordinary Mathematical Proofs
The EPGY Theorem-Proving Environment is designed to help students write ordinary mathematical proofs. The system, used in a selection of computer-based proof-intensive mathematics ...
David McMath, Marianna Rozenfeld, Richard Sommer
ECIS
2000
14 years 11 months ago
Chief Information Officer Influence: An Exploratory Study
- Effective initiation and execution of IS/T projects and systems has become a critical core competence for many organizations. One key to this is the influence of the senior execu...
Harvey G. Enns, Sid L. Huff
AIEDU
2008
105views more  AIEDU 2008»
14 years 10 months ago
A Human-Computer Dialogue System for Educational Debate: A Computational Dialectics Approach
: This paper reports research concerning issues involved in adopting a computational dialectics approach to develop a human-computer dialogue system for educational debate. In part...
Tangming Yuan, David J. Moore, Alec Grierson