Recently, detectors of gaming the system have been developed for several intelligent tutoring systems where the problem-solving process is reified, and gaming consists of systemati...
Ryan S. J. d. Baker, Antonija Mitrovic, Moffat Mat...
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination o...
Philippe Bonnet, Johannes Gehrke, Praveen Seshadri
Web-based applications with a large variety of users suffer from the inability to satisfy heterogeneous needs. A remedy for the negative effects of the traditional "one-size-...
Paolo Buono, Maria Francesca Costabile, Stefano Gu...
Traditionally, distributed computing problems have been solved by partitioning data into chunks able to be handled by commodity hardware. Such partitioning is not possible in case...