Ingénierie dirigée par les modèles pour la construction de dispositifs pédagogiques sur des plateformes de formation
PA Caron - 2007 - theses.hal.science
Notre problématique en EIAH (environnements informatiques pour l'apprentissage humain)
concerne la place de l'informatique quant à l'aide qu'elle peut apporter à des enseignants …
concerne la place de l'informatique quant à l'aide qu'elle peut apporter à des enseignants …
Semantic access control in web based communities
Web based social communities are one of the most widely used applications nowadays.
Ubiquitous computing and access capabilities leverage the evolution of highly dynamic …
Ubiquitous computing and access capabilities leverage the evolution of highly dynamic …
[PDF][PDF] Virtualidades reales
F Yus - Nuevas formas de comunidad en la era de Internet …, 2007 - personal.ua.es
Juan, un chico adolescente, está sentado en un banco del patio de su instituto, a la hora del
recreo. A su lado están también sentados varios colegas suyos que viven cerca de su casa …
recreo. A su lado están también sentados varios colegas suyos que viven cerca de su casa …
Social Global Repository: using semantics and social web in software projects
R Colomo-Palacios… - … of Knowledge and …, 2008 - inderscienceonline.com
Software has become crucial for everyday matters. In this context, the effective management
of the software development process has become an essential issue for business survival in …
of the software development process has become an essential issue for business survival in …
[PDF][PDF] Learning Management System component-based design: a model driven approach
E Renaux, PA Caron, X Le Pallec - NOCE Team, Trigone …, 2005 - researchgate.net
System (CMS) platforms to build web sites has aroused great interest. In this paper we focus
on Learning Management Systems that are more and more often used to construct distant …
on Learning Management Systems that are more and more often used to construct distant …
Enabling access control and privacy through ontology
MMR Chowdhury, J Noll… - 2007 Innovations in …, 2007 - ieeexplore.ieee.org
The need for information security and privacy in today's connected systems is overwhelming.
This paper focuses on the access control and privacy issues in a project based business …
This paper focuses on the access control and privacy issues in a project based business …
A logistic distribution routes solving strategy based on the physarum network and ant colony optimization algorithm
Q Chen, T Qian, K Liu - … Safety and Security, and 2015 IEEE …, 2015 - ieeexplore.ieee.org
The Physarum Network with single inlet and multi outlet model (SMPN) exhibits a unique
feature that the critical pipelines are reserved with the evolution of network. In addition, ant …
feature that the critical pipelines are reserved with the evolution of network. In addition, ant …
Software engineering 2.0: a social global repository based on semantic annotation and social web for knowledge management
R Colomo-Palacios, JM Gómez-Berbís… - The Open Knowlege …, 2008 - Springer
The effective management of the software development process has become an essential
for business survival in an ever more competitive industry. In order to gain business …
for business survival in an ever more competitive industry. In order to gain business …
Capturing semantics for information security and privacy assurance
MMR Chowdhury, J Chamizo, J Noll… - … and Computing: 5th …, 2008 - Springer
Security and privacy assurance is indispensable for ubiquitous access to information and
resources. This paper focuses on the security and privacy provisions in a restricted …
resources. This paper focuses on the security and privacy provisions in a restricted …
[PDF][PDF] Acting your age: a study of the relationship between online social interaction and identity in older adults
PT Dell - 2008 - core.ac.uk
This study combined quantitative and qualitative methods to investigate the relationship
between Internet use and identity, particularly age-identity, in older Internet users. It has a …
between Internet use and identity, particularly age-identity, in older Internet users. It has a …