It is difficult to collect evidence of adequate performance if an assessor and the assessees have different linguistic and cultural backgrounds. This paper considers three entries...
This paper describes the implementation of blog system in an international distance course between Japan and Taiwan. In the study, blog was used as a tool to encourage students’...
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
One of the greatest challenges in the design of realistic Artificial Intelligence (AI) in computer games is agent movement. Pathfinding strategies are usually employed as the core...
The join of two n-ary string relations is a main operation regarding to applications. n-Ary rational string relations are realized by weighted finite-state machines with n tapes. ...