Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Accessibility implementation efforts are generally focused towards some typical user impairments and a few interaction devices for a particular user scenario. Whereas there are num...
Foundational and scalable techniques for runtime safety analysis of multithreaded programs are explored in this paper. A technique based on vector clocks to extract the causal dep...
Virtual communities are a popular phenomenon today. They are significantly altering the specifics of how people work, spend their free time and interact socially. Moreover, they h...
— Most e-learning systems require intervention from a teacher. The development of adaptive hypermedia systems, such as intelligent tutoring systems, aimed to reduce the teachersâ...