A text generation approach is proposed for e-learning purposes, based on the idea that the text should include some features in the way that its different perspectives can be described efficiently. In the meantime a m...
详细信息
A text generation approach is proposed for e-learning purposes, based on the idea that the text should include some features in the way that its different perspectives can be described efficiently. In the meantime a method is discussed for composing the significant concepts, in order to produce new ideas for the learner based on his/her learning conditions.
We illustrate the close connection between cryptographic protocols and games. Several two-person game theoretic concepts and techniques are used here to model and analyze different two-party cryptographic protocols in...
详细信息
We illustrate the close connection between cryptographic protocols and games. Several two-person game theoretic concepts and techniques are used here to model and analyze different two-party cryptographic protocols in a malicious model in order to find equilibrium conditions that allow to protect honest parties against all possible strategies of adversaries.
The Internet is currently being used to support increasingly complex interactions. The entities, with which applications and services need to interact, span a wide spectrum that includes desktops, PDAs, appliances, an...
详细信息
The Internet is currently being used to support increasingly complex interactions. The entities, with which applications and services need to interact, span a wide spectrum that includes desktops, PDAs, appliances, and other networked resources. Clients - which abstract users, resources and proxies thereto - within these systems communicate with each other through the exchange of events, which are essentially messages with timestamps. We explore matching, routing and network utilization issues in the context of our research prototype NaradaBrokering, which provides support for centralized, distributed and P2P interactions.
作者:
A. CristeaInfo Systems
Department of Mathematics & Computer Science Eindhovan University of Technology Netherlands
Personalization in education is supposed to be the answer to enhanced learning. Adaptive hypermedia (AH) is a means to this end. However, authoring of AH is still complicated. This paper presents a system that tries t...
详细信息
Personalization in education is supposed to be the answer to enhanced learning. Adaptive hypermedia (AH) is a means to this end. However, authoring of AH is still complicated. This paper presents a system that tries to tackle this problem, by allowing leveled authoring of the adaptive behavior of AH, for beginner authors as well as advanced authors. This approach allows authors to implement their own conceptions about instructional strategies, aimed at, e.g., specific learning styles.
A steganographic technique that uses animation to encode the message is proposed. When the technique is combined with cryptography (to encrypt the secret message before it is encoded into animation), error-control cod...
详细信息
A steganographic technique that uses animation to encode the message is proposed. When the technique is combined with cryptography (to encrypt the secret message before it is encoded into animation), error-control coding, and ASCII text embedding into frames of the animation, a very robust steganography system is obtained. Steganalysis of this proposed technique is discussed in terms of both active and passive wardens.
A new algorithm for modular multiplication for public key cryptography is presented. The algorithm is optimised with respect to area and time by use of a combination of adders and fast lookup tables. This leads to a m...
详细信息
A new algorithm for modular multiplication for public key cryptography is presented. The algorithm is optimised with respect to area and time by use of a combination of adders and fast lookup tables. This leads to a multiplication method that can significantly speed up exponentiation, because the values of the lookup table do not depend on the operands of the individual multiplication. The speedup is achieved by continuous modification of one operand.
Statistical image analysis is simple to implement, but rarely achieves high levels of significance in image similarity searches except on contrived image collections. It is proposed that simple geometric features and ...
详细信息
Statistical image analysis is simple to implement, but rarely achieves high levels of significance in image similarity searches except on contrived image collections. It is proposed that simple geometric features and measure of grey level and color can be combined to form a similarity-based retrieval system that is both efficient and effective.
As the evolutionary search progresses, it is important to avoid reaching a state where the genetic operators can no longer produce superior offspring, prematurely. This is likely to occur when the search space reaches...
详细信息
As the evolutionary search progresses, it is important to avoid reaching a state where the genetic operators can no longer produce superior offspring, prematurely. This is likely to occur when the search space reaches a homogeneous or near-homogeneous configuration converging to a local optimal solution. Maintaining a certain degree of population diversity is widely believed to help curb this problem. The proposed technique presented here, uses informed genetic operations to reach promising, but un/under-explored areas of the search space, while discouraging local convergence. Elitism is used at a different level aiming at convergence. The proposed technique's improved performance in terms solution precision and convergence characteristics is observed on a number of benchmark test functions with a genetic algorithm (GA) implementation.
Key agreement and identity authentication protocols play important role in ad hoc networks. Two novel key agreement protocols are proposed and their security and efficiency are analyzed. Besides, an identity authentic...
详细信息
ISBN:
(纸本)0769521088
Key agreement and identity authentication protocols play important role in ad hoc networks. Two novel key agreement protocols are proposed and their security and efficiency are analyzed. Besides, an identity authentication protocol based on the threshold group signatures is presented. Compared with the existing algorithms, it is safe, efficient and adaptable to the multihop characteristic of ad hoc networks. In addition, the privacy of the basic group key and identity certificate is guaranteed by the intractability of computing discrete logarithm.
Introductory human computer interaction (HCI) courses are fundamental in the computer science curriculum as there is not only a need for teaching students to solve problems, but also to map their solutions to end-user...
详细信息
Introductory human computer interaction (HCI) courses are fundamental in the computer science curriculum as there is not only a need for teaching students to solve problems, but also to map their solutions to end-users. Currently, there are several high level approaches to teaching such courses. Many of these courses can gain benefit through reformatting or augmenting current course structures with recurrent exercises. This paper suggests two types of recurrent exercises and contains data on one semester of a course using this methodology of teaching.
暂无评论