Sciweavers

3104 search results - page 5 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
I3
2007
15 years 5 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
CCS
2011
ACM
14 years 4 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
IACR
2011
132views more  IACR 2011»
14 years 3 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
ICAI
2009
15 years 1 months ago
How Reasoning Achieves Context Integration into Syntax Parsing
Motivated by a representational model for the cross-modal interaction between language and other modalities we present a framework for the integration of contextual information int...
Patrick McCrae
NRHM
2008
93views more  NRHM 2008»
15 years 4 months ago
Semantics on demand: Can a Semantic Wiki replace a knowledge base?
In the same way that Wikis have become the mechanism that has enabled groups of users to collaborate on the production of hypertexts on the web, Semantic Wikis promise a future of...
David E. Millard, Chris Bailey, Philip Boulain, Sw...