Sciweavers

220 search results - page 37 / 44
» Authoring Issues beyond Tools
Sort
View
CMS
2001
133views Communications» more  CMS 2001»
13 years 11 months ago
Asynchronous Large-Scale Certification Based on Certificate Verification Trees
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for im...
M. Mar Albà, Josep Domingo-Ferrer, Francesc...
COOTS
2001
13 years 11 months ago
Kava - Using Byte code Rewriting to add Behavioural Reflection to Java
Many authors have proposed using byte code rewriting as a way of adapting or extending the behaviour of Java There are toolkits available that simplify this process and raise the ...
Ian Welch, Robert J. Stroud
DOA
2001
94views more  DOA 2001»
13 years 11 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
CHI
2008
ACM
13 years 11 months ago
Testing vs. code inspection vs. what else?: male and female end users' debugging strategies
Little is known about the strategies end-user programmers use in debugging their programs, and even less is known about gender differences that may exist in these strategies. With...
Neeraja Subrahmaniyan, Laura Beckwith, Valentina G...
JUCS
2008
166views more  JUCS 2008»
13 years 9 months ago
Learning Design in Adaptive Educational Hypermedia Systems
: After more than ten years of research aiming at defining methods and techniques to deliver personalized instruction, Adaptive Educational Hypermedia Systems have not made the jum...
Adriana J. Berlanga, Francisco José Garc&ia...