Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
The World Wide Web has emerged as one of the most widely available and diverse information sources of all time, yet the options for acessing this information are limited. This pape...
Mobile technologies are deployed into diverse social, cultural, political and geographic settings, and incorporated into diverse forms of personal and collective mobility. We pres...
Towards a unifying model of concurrency, we have designed and implemented LMNtal (pronounced "elemental"), a model and language based on hierarchical graph rewriting tha...
Successful self-regulated learning in a personalized learning environment (PLE) requires self-monitoring of the learner and reflection of learning behaviour. We introduce a tool ca...
Hans-Christian Schmitz, Maren Scheffel, Martin Fri...