The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferre...
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
This position paper shows how several classical methods in adaptive learning can be addressed using IMS Learning Design. After a definition of four main questions to classify adap...
Traditional non-parametric statistical learning techniques are often computationally attractive, but lack the same generalization and model selection abilities as state-of-the-art...
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...