Sciweavers

4839 search results - page 791 / 968
» Providing SCORM with adaptivity
Sort
View
143
Voted
IJISEC
2006
106views more  IJISEC 2006»
15 years 4 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
ITIIS
2008
84views more  ITIIS 2008»
15 years 4 months ago
A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss
Packet losses tend to occur during short error bursts separated by long periods of relatively error-free transmission. There is also a significant spatial correlation in loss amon...
Jinsuk Baek, Jehan-François Pâris
IJKL
2006
94views more  IJKL 2006»
15 years 4 months ago
Supporting teachers as content authors in intelligent educational systems
: Intelligent Educational Systems (IESs) need large amounts of educational content that is typically not provided by the creators of these systems. In this paper we discuss a new a...
Peter Brusilovsky, Judith Knapp, Johann Gamper
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 4 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
IJSNET
2006
217views more  IJSNET 2006»
15 years 4 months ago
Optimal sleep scheduling with transmission range assignment in application-specific wireless sensor networks
: To extend the functional lifetime of battery-operated Wireless Sensor Networks (WSNs), stringent sleep scheduling strategies with communication duty cycles running at sub-1% rang...
Rick W. Ha, Pin-Han Ho, Xuemin Shen