When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confiden...
Researchers of educational technologies are often asked to do the impossible: make students learn and have them enjoy it. These two objectives, though not mutually exclusive, are f...
G. Tanner Jackson, Arthur C. Graesser, Danielle S....
Older people with dementia often decline in short-term memory and forget what to do next to complete their activities of daily living (ADLs), such as tea-making and toothbrushing....
Hua Si, Seung Jin Kim, Nao Kawanishi, Hiroyuki Mor...
To produce quality software and evolve them in an economic and timely fashion, enactable software process models are used for regulating development activities with the support of ...
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...