Sciweavers

2290 search results - page 28 / 458
» Extensible Protected Types
Sort
View
AIED
2005
Springer
14 years 1 months ago
The eXtensible Tutor Architecture: A New Foundation for ITS
The eXtensible Tutor Architecture (XTA) was designed as a platform for creating and deploying many types of Intelligent Tutoring Systems across many different platforms. The XTA pr...
Goss Nuzzo-Jones, Jason A. Walonoski, Neil T. Heff...
ICANN
2005
Springer
14 years 1 months ago
f-SWRL: A Fuzzy Extension of SWRL
Although the combination of OWL and Horn rules results in the creation of a highly expressive language, i.e. SWRL, there are still many occasions where this language fails to accur...
Jeff Z. Pan, Giorgos B. Stamou, Vassilis Tzouvaras...
ICDE
2009
IEEE
149views Database» more  ICDE 2009»
14 years 9 months ago
OPAQUE: Protecting Path Privacy in Directions Search
Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus r...
Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baih...
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
14 years 1 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
ICDE
2005
IEEE
183views Database» more  ICDE 2005»
14 years 1 months ago
Protection of Location Privacy using Dummies for Location-based Services
Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because position data obtained by such devices incl...
Hidetoshi Kido, Yutaka Yanagisawa, Tetsuji Satoh