Ingénierie dirigée par les modèles pour la construction de dispositifs pédagogiques sur des plateformes de formation

PA Caron - 2007 - theses.hal.science
Notre problématique en EIAH (environnements informatiques pour l'apprentissage humain)
concerne la place de l'informatique quant à l'aide qu'elle peut apporter à des enseignants …

Semantic access control in web based communities

N Elahi, MMR Chowdhury, J Noll - 2008 The Third International …, 2008 - ieeexplore.ieee.org
Web based social communities are one of the most widely used applications nowadays.
Ubiquitous computing and access capabilities leverage the evolution of highly dynamic …

[PDF][PDF] Virtualidades reales

F Yus - Nuevas formas de comunidad en la era de Internet …, 2007 - personal.ua.es
Juan, un chico adolescente, está sentado en un banco del patio de su instituto, a la hora del
recreo. A su lado están también sentados varios colegas suyos que viven cerca de su casa …

Social Global Repository: using semantics and social web in software projects

R Colomo-Palacios… - … of Knowledge and …, 2008 - inderscienceonline.com
Software has become crucial for everyday matters. In this context, the effective management
of the software development process has become an essential issue for business survival in …

[PDF][PDF] Learning Management System component-based design: a model driven approach

E Renaux, PA Caron, X Le Pallec - NOCE Team, Trigone …, 2005 - researchgate.net
System (CMS) platforms to build web sites has aroused great interest. In this paper we focus
on Learning Management Systems that are more and more often used to construct distant …

Enabling access control and privacy through ontology

MMR Chowdhury, J Noll… - 2007 Innovations in …, 2007 - ieeexplore.ieee.org
The need for information security and privacy in today's connected systems is overwhelming.
This paper focuses on the access control and privacy issues in a project based business …

A logistic distribution routes solving strategy based on the physarum network and ant colony optimization algorithm

Q Chen, T Qian, K Liu - … Safety and Security, and 2015 IEEE …, 2015 - ieeexplore.ieee.org
The Physarum Network with single inlet and multi outlet model (SMPN) exhibits a unique
feature that the critical pipelines are reserved with the evolution of network. In addition, ant …

Software engineering 2.0: a social global repository based on semantic annotation and social web for knowledge management

R Colomo-Palacios, JM Gómez-Berbís… - The Open Knowlege …, 2008 - Springer
The effective management of the software development process has become an essential
for business survival in an ever more competitive industry. In order to gain business …

Capturing semantics for information security and privacy assurance

MMR Chowdhury, J Chamizo, J Noll… - … and Computing: 5th …, 2008 - Springer
Security and privacy assurance is indispensable for ubiquitous access to information and
resources. This paper focuses on the security and privacy provisions in a restricted …

[PDF][PDF] Acting your age: a study of the relationship between online social interaction and identity in older adults

PT Dell - 2008 - core.ac.uk
This study combined quantitative and qualitative methods to investigate the relationship
between Internet use and identity, particularly age-identity, in older Internet users. It has a …