: We describe the design and evaluation of an affective pedagogical agent persona for Intelligent Tutoring Systems. The goal of our research was to develop an agent embodying a per...
Konstantin Zakharov, Antonija Mitrovic, Lucy Johns...
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
Global systems – systems which may operate over transient networks including mobile elements and in which computation itself may be mobile – are gaining in importance. Neverthe...
Hubert Baumeister, Nora Koch, Piotr Kosiuczenko, P...
—Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System–on–Chip (SoC) designs. However, IP vendors are facing major challenges to protect...
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...