As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
Abstract. Successful learning though exploration in open learning environments has been shown to depend on whether students possess the necessary meta-cognitive skills, including s...
We have implemented a novel peer-to-peer based environment called Comtella, which allows students to contribute and share class-related resources. This system has been implemented ...
This article provides an experimental analysis of the possibilistic handling of default rules. Three different nonmonotonic consequence relations are considered: minimum specifici...