Exploring student test, homework, and other assessment scores is a challenge for most teachers, especially when attempting to identify cross-assessment weaknesses and produce fina...
Sorelle A. Friedler, Yee Lin Tan, Nir J. Peer, Ben...
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Abstract: Since von Neumann's seminal work around 1950, computer scientists and others have studied the algorithms needed to support self-replicating systems. Much of this wor...
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
iMobile is a platform that addresses the research issues in building mobile services. iMobile acts as a message gateway that allows mobile devices using various protocols on diffe...
Herman Chung-Hwa Rao, Yih-Farn Chen, Di-Fa Chang, ...