This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible...
We examine the design space of auction mechanisms and identify three core activities that structure this space. Formal parameters qualifying the performance core activities enable...
Peter R. Wurman, Michael P. Wellman, William E. Wa...
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
The growing emphasis on learner-centered education focuses on intrinsically motivated learning via engaging problem-solving activities. Habitable 3D learning environments, in which...
William H. Bares, Luke S. Zettlemoyer, James C. Le...
Virtual interactive student-oriented learning environment (VISOLE) is a game-based constructivist pedagogical approach that encompasses the creation of an online interactive world ...
Kevin K. F. Cheung, Morris Siu Yung Jong, Fong Lok...