This text analyses the papers accepted for the workshop "Reuse of designs: an interdisciplinary cognitive approach" (Visser, 1993). Several dimensions and questions consi...
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
To build a web-based virtual learning environment depends on information technologies, concerns technology supporting learning methods and theories. A web-based virtual online cla...
In Ôcontextual learning theoryÕ three types of contextual conditions (differentiation of learning procedures and materials, integrated ICT support, and improvement of developme...
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...