Effective teaching involves treating the presentation of new material and the assessment of students’ mastery of this material as part of a seamless and continuous feedback cycl...
Kimberle Koile, Kevin Chevalier, Michel Rbeiz, Ada...
In this paper, we describe a user study aimed at evaluating the effectiveness of two different data visualization techniques developed for describing complex environmental changes...
Firewalls have an important role in network security. However, managing firewall policies is an extremely complex task because the large number of interacting rules in single or d...
Understanding answers to open-ended explanation questions is important in intelligent tutoring systems. Existing systems use natural language techniques in essay analysis, but rev...
Myroslava Dzikovska, Gwendolyn E. Campbell, Charle...
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...