Abstract. Much work using argumnentation frameworks treats arguments as enbstract, related by a uniform attack relation which always succeeds unless the attacker can itself be defe...
We investigate the process of collaborative modeling by analyzing conversations and loud thinking during modeling sessions and the resulting models themselves. We discovered the ba...
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
: An approach to student modelling is presented where learners build their own student models. A more accurate model may thereby be obtained, and learners may reflect on their beli...
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...