Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
One important application of wireless sensor networks is tracking moving objects. The recent progress has made it possible for tiny sensors to have more computing power and storag...
: The 'Reusable Learning Objects' Centre for Excellence in Teaching and Learning (RLO-CETL) is a five-year project (2005-2010) involving staff from three universities (Lo...
This work outlines the design process of a user centered learning object repository. A repository should foster the development and acquisition of both generic and specific informa...