Sciweavers

26354 search results - page 103 / 5271
» How we refactor, and how we know it
Sort
View
AAAI
2010
13 years 11 months ago
How Incomplete Is Your Semantic Web Reasoner?
Conjunctive query answering is a key reasoning service for many ontology-based applications. In order to improve scalability, many Semantic Web query answering systems give up com...
Giorgos Stoilos, Bernardo Cuenca Grau, Ian Horrock...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 10 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
IJDET
2010
130views more  IJDET 2010»
13 years 7 months ago
A Unified Learning Style Model for Technology-Enhanced Learning: What, Why and How?
: This paper deals with the use of learning styles in technology-enhanced learning, by introducing a so-called "Unified Learning Style Model" (ULSM). The article aims at ...
Elvira Popescu
ACMACE
2010
ACM
13 years 5 months ago
How does Facebook browsing affect self-awareness and social well-being: the role of narcissism
Social networking sites such as Facebook have become extremely popular recently. In this research, we studied how Facebook browsing affects self-awareness and social well-being. O...
Lin Qiu, Han Lin, Angela Ka-yee Leung
CORR
2011
Springer
135views Education» more  CORR 2011»
13 years 5 months ago
How to make the most of a shared meal: plan the last bite first
If you are sharing a meal with a companion, how best to make sure you get your favourite fork-fulls? Ethiopian Dinner is a game in which two players take turns eating morsels from ...
Lionel Levine, Katherine E. Stange