Abstract. We report our work towards building user models of learner’s development based upon evidence of their interactions with an e-learning website composed of multimedia lea...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
A novel mathematical framework inspired on Morse Theory for topological triangle characterization in 2D meshes is introduced that is useful for applications involving the creation...
Luis Gustavo Nonato, Mario A. S. Lizier, J. Batist...
The object Constraint Language (OCL), which forms part of the UML set of modelling notations, is a precise, textual language for expressing constraints that cannot be shown diagram...
Ali Hamie, Franco Civello, John Howse, Stuart Kent...
Advances in computer networking technology and open system standards are making the creation and management of virtual enterprises feasible. A virtual enterprise is a temporary co...
Hasan Davulcu, Michael Kifer, L. Robert Pokorny, C...