Intelligent tutoring systems help students acquire cognitive skills by tracing students’ knowledge and providing relevant feedback. However, feedback that focuses only on the cog...
Ido Roll, Ryan Shaun Baker, Vincent Aleven, Bruce ...
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Preference elicitation — the process of asking queries to determine parties’ preferences — is a key part of many problems in electronic commerce. For example, a shopping age...
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
The allocation of office space in any large institution is usually a problematical issue, which often demands a substantial amount of time to perform manually. The result of this a...