We describe a real-time musical agent that generates an audio drum-track by concatenating audio segments automatically extracted from pre-existing musical files. The drum-track c...
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
— In this paper I show how ontologies support the student modelling through the semantic definition of concepts that depict a student. The aim is to outline the framework for bui...
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
The paper investigates the use of computational intelligence for adaptive lesson presentation in a Web-based learning environment. A specialized connectionist architecture is devel...
Kyparisia A. Papanikolaou, George D. Magoulas, Mar...