Search
Now showing items 21-30 of 976
Comparison of collaborative and content-based automatic recommendation approaches in a digital library of Serbian PhD dissertations
(2017)
Digital libraries have become an excellent information resource for researchers. However, users of digital libraries would be served better by having the relevant items ‘pushed’ to them. In this research, we present various ...
Extended conformal symmetries and U(1) currents
(1989)
The authors investigate the structure of extended conformal algebras generated by local chiral fields of spin 1,2,. . .,n using the Gelfand-Dickey algebra of formal pseudodifferential operators for the gl(n) algebra. The ...
IWIM semantics via fibred automata
(2002)
Coordination programming helps to separate concerns in the programming of the coordination activities in complex applications software. It separates the development, verification, maintenance, and reuse of the coordination ...
Using argumentation logic for firewall policy specification and analysis
(2006)
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...
The scientific contribution of marek sergot
(2012)
Marek Sergot's technical contributions range over different subjects. He has developed a series of novel ideas and formal methods bridging different research domains, such as artificial intelligence, computational logic, ...
Classification of neuromuscular disorders using features extracted in the wavelet domain of sEMG signals: a case study
(2017)
The present study introduces a method for detecting possible neuropathy or myopathy cases of a subject based on surface electromyograms signals
Do human cognitive differences in information processing affect preference and performance of CAPTCHA?
(2015)
A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a widely used security defense mechanism that is utilized by service providers to determine whether the entity interacting with their ...
The interplay between humans, technology and user authentication: A cognitive processing perspective
(2017)
This paper investigates the interplay among human cognitive processing differences (field dependence vs. field independence), alternative interaction device types (desktop vs. touch) and user authentication schemes (textual ...
Security for diversity: Studying the effects of verbal and imagery processes on user authentication mechanisms
(2013)
Stimulated by a large number of different theories on human cognition, suggesting that individuals have different habitual approaches in retrieving, recalling, processing and storing verbal and graphical information, this ...