Sciweavers

671 search results - page 103 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
AI
2000
Springer
13 years 8 months ago
Model-based reasoning about learner behaviour
Automated handling of tutoring and training functions in educational systems requires the availability of articulate domain models. In this article we further develop the applicat...
Kees de Koning, Bert Bredeweg, Joost Breuker, Bob ...
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
14 years 9 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 9 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
AH
2000
Springer
14 years 26 days ago
ACE - Adaptive Courseware Environment
: The Adaptive Courseware Environment (ACE) is a WWW-based tutoring framework which combines methods of knowledge representation, instructional planning, and adaptive media generat...
Marcus Specht
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 8 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy