Sciweavers

1070 search results - page 182 / 214
» A Study on Personality in Designing Adaptive e-Learning Syst...
Sort
View
CIKM
2004
Springer
14 years 1 months ago
The robustness of content-based search in hierarchical peer to peer networks
Hierarchical peer to peer networks with multiple directory services are an important architecture for large-scale file sharing due to their effectiveness and efficiency. Recent ...
M. Elena Renda, Jamie Callan
ASSETS
2008
ACM
13 years 9 months ago
Hunting for headings: sighted labeling vs. automatic classification of headings
Proper use of headings in web pages can make navigation more efficient for blind web users by indicating semantic di visions in the page. Unfortunately, many web pages do not use ...
Jeremy T. Brudvik, Jeffrey P. Bigham, Anna Cavende...
JTAER
2006
100views more  JTAER 2006»
13 years 7 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
IDTRUST
2009
ACM
14 years 2 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
ATAL
2005
Springer
14 years 1 months ago
Knowledge and social laws
In this paper we combine existing work in the area of social laws with a framework for reasoning about knowledge in multi-agent systems. The unifying framework in which this is do...
Wiebe van der Hoek, Mark Roberts, Michael Wooldrid...