Journal: Lecture Notes in Computer Science
Loading...
Abbreviation
LNCS
Publisher
Springer
Search Results
Publications 1 - 10 of 2647
- Usage control in service-oriented ArchitecturesItem type: Conference Paper
Lecture Notes in Computer Science ~ Trust, privacy and security in digital businessPretschner, Alexander; Massacci, Fabio; Hilty, Manuel (2007) - Advice complexity of the online search problemItem type: Conference Paper
Lecture Notes in Computer Science ~ Combinatorial AlgorithmsClemente, Jhoirene; Hromkovič, Juraj; Komm, Dennis; et al. (2016) - Temporal prediction of respiratory motion using a trained ensemble of forecasting methodsItem type: Conference Paper
Lecture Notes in Computer Science ~ Medical Imaging and Augmented Reality: 7th International Conference, MIAR 2016, Bern, Switzerland, August 24-26, 2016, ProceedingsChen, Xiaoran; Tanner, Christine; Goksel, Orcun; et al. (2016) - Adaptive Approach for Sensor Placement Combining a Quantitative Strategy with Engineering PracticeItem type: Conference Paper
Lecture Notes in Computer Science ~ Advanced Computing Strategies for EngineeringBertola, Numa J.; Smith, Ian F.C. (2018) - Compact Selective Opening Security from LWEItem type: Conference Paper
Lecture Notes in Computer Science ~ Public-Key Cryptography – PKC 2024Hofheinz, Dennis; Hostáková, Kristina; Kastner, Julia Dorothea Beate; et al. (2024)Selective opening (SO) security is a security notion for public-key encryption schemes that captures security against adaptive corruptions of senders. SO security comes in chosen-plaintext (SO-CPA) and chosen-ciphertext (SO-CCA) variants, neither of which is implied by standard security notions like IND-CPA or IND-CCA security. - Collaborative Verification and Testing with Explicit AssumptionsItem type: Conference Paper
Lecture Notes in Computer Science ~ FM 2012: Formal Methods : 18th International Symposium, Paris, France, August 27-31, 2012 : proceedingsChristakis, Maria; Müller, Peter; Wüstholz, Valentin (2012) - Beyond Knowledge Tracing: Modeling Skill Topologies with Bayesian NetworksItem type: Conference Paper
Lecture Notes in Computer Science ~ Intelligent Tutoring SystemsKäser, Tanja; Klingler, Severin; Schwing, Alexander G.; et al. (2014)Modeling and predicting student knowledge is a fundamental task of an intelligent tutoring system. A popular approach for student modeling is Bayesian Knowledge Tracing (BKT). BKT models, however, lack the ability to describe the hierarchy and relationships between the different skills of a learning domain. In this work, we therefore aim at increasing the representational power of the student model by employing dynamic Bayesian networks that are able to represent such skill topologies. To ensure model interpretability, we constrain the parameter space. We evaluate the performance of our models on five large-scale data sets of different learning domains such as mathematics, spelling learning and physics, and demonstrate that our approach outperforms BKT in prediction accuracy on unseen data across all learning domains. - New Preimage Attacks Against Reduced SHA-1Item type: Conference Paper
Lecture Notes in Computer Science ~ Advances in cryptology : proceedingsKnellwolf, Simon; Khovratovich, Dmitry (2012) - Forwarding accountability: A challenging necessity of the future data planeItem type: Conference Paper
Lecture Notes in Computer Science ~ Open Problems in Network Security. IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected PapersPappas, Christos; Reischuk, Raphael M.; Perrig, Adrian (2016) - Fully Online Matching with Advice on General Bipartite Graphs and PathsItem type: Book Chapter
Lecture Notes in Computer Science ~ Adventures Between Lower Bounds and Higher AltitudesBöckenhauer, Hans-Joachim; Di Caro, Lucia; Unger, Walter (2018)
Publications 1 - 10 of 2647