Sciweavers

701 search results - page 52 / 141
» Comments on
Sort
View
PET
2005
Springer
15 years 9 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
SGAI
2005
Springer
15 years 9 months ago
Experience with Ripple-Down Rules
Ripple-Down Rules (RDR) is an approach to building knowledgebased systems (KBS) incrementally, while the KBS is in routine use. Domain experts build rules as a minor extension to ...
Paul Compton, Lindsay Peters, Glenn Edwards, Tim G...
ADS
2004
Springer
15 years 9 months ago
Generating Socially Appropriate Tutorial Dialog
Analysis of student-tutor coaching dialogs suggest that good human tutors attend to and attempt to influence the motivational state of learners. Moreover, they are sensitive to the...
W. Lewis Johnson, Paola Rizzo, Wauter Bosma, Sande...
112
Voted
AH
2004
Springer
15 years 9 months ago
Social Adaptive Navigation Support for Open Corpus Electronic Textbooks
Closed corpus AH systems demonstrate what is possible to achieve with adaptive hypermedia technologies; however they are impractical for dealing with the large volume of open corpu...
Peter Brusilovsky, Girish Chavan, Rosta Farzan
105
Voted
CIARP
2004
Springer
15 years 9 months ago
Pattern Recognition via Vasconcelos' Genetic Algorithm
In this paper we describe a heuristic approach to the problem of identifying a pattern embedded within a figure from a predefined set of patterns via the utilization of a genetic a...
Angel Fernando Kuri Morales