We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Ripple-Down Rules (RDR) is an approach to building knowledgebased systems (KBS) incrementally, while the KBS is in routine use. Domain experts build rules as a minor extension to ...
Paul Compton, Lindsay Peters, Glenn Edwards, Tim G...
Analysis of student-tutor coaching dialogs suggest that good human tutors attend to and attempt to influence the motivational state of learners. Moreover, they are sensitive to the...
W. Lewis Johnson, Paola Rizzo, Wauter Bosma, Sande...
Closed corpus AH systems demonstrate what is possible to achieve with adaptive hypermedia technologies; however they are impractical for dealing with the large volume of open corpu...
In this paper we describe a heuristic approach to the problem of identifying a pattern embedded within a figure from a predefined set of patterns via the utilization of a genetic a...