Sciweavers

13822 search results - page 2665 / 2765
» Models in Knowledge Management
Sort
View
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
14 years 2 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
ECTEL
2006
Springer
14 years 2 months ago
Getting to Know Your Student in Distance Learning Contexts
Abstract. Good teachers know their students, and exploit this knowledge to adapt or optimise their instruction. Teachers know their students because they interact with them face-to...
Claus Zinn, Oliver Scheuer
ERCIMDL
2006
Springer
204views Education» more  ERCIMDL 2006»
14 years 2 months ago
Comparing and Combining Two Approaches to Automated Subject Classification of Text
A machine-learning and a string-matching approach to automated subject classification of text were compared, as to their performance, advantages and downsides. The former approach ...
Koraljka Golub, Anders Ardö, Dunja Mladenic, ...
EVOW
2006
Springer
14 years 2 months ago
A Preliminary Study on Handling Uncertainty in Indicator-Based Multiobjective Optimization
Abstract. Real-world optimization problems are often subject to uncertainties, which can arise regarding stochastic model parameters, objective functions and decision variables. Th...
Matthieu Basseur, Eckart Zitzler
ITS
2000
Springer
159views Multimedia» more  ITS 2000»
14 years 2 months ago
Can We Learn from ITSs?
With the rise of VR, the internet, and mobile technologies and the shifts in educational focus from teaching to learning and from solitary to collaborative work, it's easy (bu...
Benedict du Boulay
« Prev « First page 2665 / 2765 Last » Next »