Researchers have detailed the importance of routines in how people live and work, while also cautioning system designers about the importance of people's idiosyncratic behavi...
Abstract. In this paper, we describe how the BBC is working to integrate data and linking documents across BBC domains by using Semantic Web technology, in particular Linked Data, ...
Georgi Kobilarov, Tom Scott, Yves Raimond, Silver ...
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
: This paper deals with the use of learning styles in technology-enhanced learning, by introducing a so-called "Unified Learning Style Model" (ULSM). The article aims at ...
There are different methods to build an anonymity service using MIXes. A substantial decision for doing so is the method of choosing the MIX route. In this paper we compare two sp...
Oliver Berthold, Andreas Pfitzmann, Ronny Standtke