The acquisition of information is generally thought to be deliberately sought using a search or query mechanism or by browsing or scanning an information space. People, however, f...
Recent developments in software component technology have renewed the promise of reusable software. Combining this with the possibilities of sharing simulation results and models ...
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
: Elaborations of Competence-based Knowledge Space Theory (CbKST) incorporate skills that refer to the conceptual information of the domain as well as to the activities learners ar...
: This paper describes an ontology-based approach aiming at helping biologists to annotate their documents and at facilitating their information retrieval task. Our approach, based...