Sciweavers

1407 search results - page 144 / 282
» Systems Theory Model for Information Security
Sort
View
CEEMAS
2007
Springer
14 years 2 months ago
Simulating a Human Cooperative Problem Solving
Abstract. We are interested in understanding and simulating how humans elaborate plans in situations where knowledge is incomplete and how they interact to obtain missing informati...
Alexandre Pauchet, Amal El Fallah-Seghrouchni, Nat...
HT
2003
ACM
14 years 1 months ago
"Pluggable" user models for adaptive hypermedia in education
Most adaptive hypermedia systems used in education implement a single user model – inevitably originally designed for a specific set of circumstances. In this paper we describe ...
Mohamed Ramzy Zakaria, Adam Moore, Craig D. Stewar...
OOPSLA
2009
Springer
14 years 2 months ago
Typestate-oriented programming
Objects model the world, and state is fundamental to a faithful modeling. Engineers use state machines to understand and reason about state transitions, but programming languages ...
Jonathan Aldrich, Joshua Sunshine, Darpan Saini, Z...
WCCE
2001
105views Education» more  WCCE 2001»
13 years 9 months ago
Designing an IT College
: The University of the United Arab Emirates (UAEU) commissioned an international panel of experts to devise a model curriculum for their new College of Information Technology. The...
Peter J. Denning, Ravi Athale, Nada Dabbagh, Danie...
EUROSEC
2010
ACM
14 years 1 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani