—With ever-growing complexity of computer and communication systems analytical methods do not scale, especially with respect to dependability assessment of information technology...
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Mal...
Abstract. Many real-time systems use runtime structural reconfiguration mechanisms based on dynamic creation and destruction of components. To support such features, UML-RT provid...
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
We have developed models of how strategies are constructed and retained as male and female high school and university students gain experience in solving online qualitative chemic...
Ron Stevens, Amy Soller, Melanie Cooper, Marcia Sp...
We present in this paper an approach to assessing student paraphrases in the intelligent tutoring system iSTART. The approach is based on measuring the semantic similarity between ...
Vasile Rus, Mihai C. Lintean, Arthur C. Graesser, ...