Computer Science (Scholarly Publications): Recent submissions
Now showing items 1001-1020 of 1420
-
Towards a Simulation-based Communication Tool to Support Semantic Business Process Management
(2008)Successfully communicating a Business Executive?s goals and desires to an IT Architect with regard to organizational change presents a major challenge. The most significant problem is relating the changes desired in ... -
Engineering Information Systems towards facilitating Scrutable and Configurable Adaptation
(Springer, 2008)End users of Adaptive Hypermedia Systems (AHS) receive an experience that has been tailored towards their specific needs. Several AHS have produced favourable results showing benefits to the user experience [2]. However, ... -
Supporting Users in Creating Pedagogically Sound Personalised Learning Objects
(Springer, 2008)Successful eLearning is predicated on the application of pedagogies appropriate to online education that respond to the capabilities and needs of the learners. Typically, designing and assembling personalized learning ... -
Higher-Order Cognition in Personalised Adaptive eLearning
(2008)In nature, the Goby fish lives in symbiosis with the burrowing shrimp; serving as a watchman in return for a place to live. Current adaptive learning systems hold an ambiguous position that attempts to compensate for ... -
Adaptive Educational Games: Providing Non-invasive Personalised Learning Experiences
(IEEE Computer Society Press, 2008)Educational games have the potential to provide intrinsically motivating learning experiences that immerse and engage the learner. However, the much heralded benefits of educational games seldom consider the one-size-fits-all ... -
VUMA: A Visual User Modeling Approach for the Personalization of Adaptive Systems
(Springer, 2008)Current approaches to explicit user modelling are generally time consuming and tedious for the user. Oftentimes poor usability and overly long questionnaires deter the end user from reusing such modelling tools, thus only ... -
Why didn't we spot that?
(IEEE, 2010)The Secure Sockets Layer (SSL) protocol and its standards-track successor, the Transport Layer Security (TLS) protocol, were developed more than a decade ago and have generally withstood scrutiny in that the protocols ... -
Delay- and Disruption-Tolerant Networking
(IEEE, 2009)Delay- and disruption-tolerant networking (DTN) grew out of attempts to develop an interplanetary Internet but has evolved into an active area of networking research, with applications in space networking, military tactical ... -
API Keys to the Kingdom
(IEEE Computer Society Press, 2009)Many Web 2.0 services offer Web 2.0 APIs for developers to use. In this article, I review one of the security mechanisms that's often included in such Web 2.0 APIs - the use of API keys - and some of the deployment issues ... -
Keys don't grow in threes
(IEEE, 2009)Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ... -
Why Don't We Encrypt Our Email?
(IEEE, 2009)Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ... -
DTN: An Architectural Retrospective
(IEEE, 2008)We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a focus on deep space to a broader class of ... -
Password policy purgatory
(IEEE, 2008)IT system users, (all of us), and administrators, (increasingly large numbers of us), must all manage some passwords. In this article, the author reviews some issues related to password policies and concludes that managing ... -
Portable storage and data loss
(IEEE, 2008)Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. In this paper, the author considers information ... -
Security Boundaries
(2008)Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. ... -
Transmission protocols for challenging networks: : LTP and LTP-T
(IEEE, 2007)Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymmetric ... -
Let me tell you something about (y)our culture?
(Hacetteppe University Department of Information Management, 2010)Each person is born into a culture that is mediated by the mother tongue. Further development of the person is often associated with schooling and education. At an early age some persons will come into contact with other ... -
Breaking out for Bologna 2010
(2010-04-07) -
Life after Digitization, Deschooling Society 2010 & beyond
(2010)Schooling may now considered to be an instrinsic part of the society. The term may be taken to cover all those formal institutions established to school young people from approximately the age of 7-11 (primary school), ... -
Supporting "Personalisation for All" through Federated User Model Exchange Services (FUMES)
(2007)The growth of applications as services has been rapid. The emergence of various standards has made it much easier to provide basic levels of service interoperability. However, in personalisation and eLearning services ...