Sciweavers

7839 search results - page 299 / 1568
» What's there and what's not
Sort
View
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 8 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
AIED
2007
Springer
15 years 8 months ago
Applying Learning Factors Analysis to Build Stereotypic Student Models
This paper demonstrates how stereotypic student groups can be created to enhance cognitive models in computer tutors. Computer tutors use cognitive models to track what skills stud...
Anna N. Rafferty, Michael Yudelson
EUC
2005
Springer
15 years 7 months ago
Dynamic Resource Discovery for Sensor Networks
As sensor networks mature the current generation of sensor networks that are application-specific and exposed only to a limited set of users will give way to heterogeneous sensor ...
Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, ...
FC
2006
Springer
94views Cryptology» more  FC 2006»
15 years 5 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
ASM
2010
ASM
15 years 5 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo