Sciweavers

183 search results - page 33 / 37
» jucs 2008
Sort
View
JUCS
2008
281views more  JUCS 2008»
13 years 9 months ago
Creating Adaptive e-Learning Board Games for School Settings Using the ELG Environment
: The use of digital games in education is well documented in the literature. They have been used in preschool, K-12, the university. A specific type of digital games is board game...
Symeon Retalis
JUCS
2008
147views more  JUCS 2008»
13 years 9 months ago
On BCK Algebras - Part I.b: An Attempt to Treat Unitarily the Algebras of Logic. New Algebras
: Since all the algebras connected to logic have, more or less explicitely, an associated order relation, it follows that they have two presentations, dual to each other. We classi...
Afrodita Iorgulescu
JUCS
2008
166views more  JUCS 2008»
13 years 9 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
JUCS
2008
112views more  JUCS 2008»
13 years 9 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
JUCS
2008
161views more  JUCS 2008»
13 years 9 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...