Sciweavers

493 search results - page 97 / 99
» Game accessibility: a survey
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 1 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
IMC
2009
ACM
14 years 1 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
SIGCOMM
2009
ACM
14 years 1 months ago
Enhancing dynamic cloud-based services using network virtualization
It is envisaged that services and applications will migrate to a cloud-computing paradigm where thin-clients on userdevices access, over the network, applications hosted in data c...
Fang Hao, T. V. Lakshman, Sarit Mukherjee, Haoyu S...
ECTEL
2007
Springer
14 years 1 months ago
Scruffy Technologies to Enable (Work-integrated) Learning
Abstract. The goal of the APOSDLE (Advanced Process-Oriented SelfDirected Learning environment) project is to support work-integrated learning of knowledge workers. We argue that w...
Stefanie N. Lindstaedt, Peter Scheir, Armin Ulbric...
ICALT
2006
IEEE
14 years 1 months ago
Mobile Technology and Content Delivery in Education
The purpose of this workshop is to identify various issues that are pertinent to the development and delivery of content in the context of mobile devices. The workshop will focus ...
Rory McGreal, Kinshuk