— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
The research literature investigating the construction of tutorial dialogue and learning companion environments present parallel experiences in attempting to emulate what has been ...
In this study, we argue that users participating in the design process will form the participation as a function of their professional role, but also as a function of their identi...
Distance learning gives benefits for training organization, which are further enhanced by using new information and communication technology. Computerbased tools provide a solutio...
In the past few years, research in the domain of networkon-chip has been concentrated on application-specific approaches. These approaches are design-time parameterized approache...