Abstract. In 2005, Gordon and Walton presented initial ideas for a computational model of defeasible argument [12, 26], which builds on and elaborates Walton's theory of argum...
This paper analyzes Internet diffusion among organizations, based on daily observation of the registration of second level domain names under the ".it" ccTLD. In particu...
This paper describes a different approach to teaching a web-applications course. Rather than lecturing, the instructor organizes material and serves as a guide as students work th...
The main objective of the CONNECT project is to develop an innovative pedagogical framework that attempts to blend formal and informal learning, proposing an educational reform to ...
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...