Sciweavers

3104 search results - page 250 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
JUCS
2008
125views more  JUCS 2008»
15 years 4 months ago
Improving AEH Courses through Log Analysis
: Authoring in adaptive educational hypermedia environment is complex activity. In order to promote a wider application of this technology, the teachers and course designers need s...
César Vialardi Sacín, Javier Bravo, ...
USS
2010
15 years 2 months ago
An Analysis of Private Browsing Modes in Modern Browsers
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey i...
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, D...
NAACL
2010
15 years 2 months ago
A Treebank Query System Based on an Extracted Tree Grammar
Recent work has proposed the use of an extracted tree grammar as the basis for treebank analysis and search queries, in which queries are stated over the elementary trees, which a...
Seth Kulick, Ann Bies
VOTEID
2007
Springer
15 years 10 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
SAINT
2003
IEEE
15 years 10 months ago
Mobile Agent based realization of a distance evaluation system
The growth of the Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation. E...
Vikram Jamwal, Sridhar Iyer