Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Abstract. While high interactivity has been one of the main characteristics of oneon-one human tutoring, a great deal of controversy surrounds the issue of whether interactivity is...
Min Chi, Pamela W. Jordan, Kurt VanLehn, Diane J. ...
It is often the case that agents within a system have distinct types of knowledge. Furthermore, whilst common goals may be agreed upon, the particular representations of the indiv...
The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via ...
Many approaches have been proposed over the years for the recognition of mathematical formulae from scanned documents. More recently a need has arisen to recognise formulae from PD...