Sciweavers

592 search results - page 15 / 119
» Learning of personalized security settings
Sort
View
PAKDD
2009
ACM
225views Data Mining» more  PAKDD 2009»
14 years 8 days ago
Accurate Synthetic Generation of Realistic Personal Information
A large proportion of the massive amounts of data that are being collected by many organisations today is about people, and often contains identifying information like names, addre...
Peter Christen, Agus Pudjijono
CCS
2001
ACM
13 years 11 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
ICALT
2006
IEEE
14 years 1 months ago
Serving Learning and Assessment in SCALE
In this paper, we present a web-based educational setting, referred to as SCALE (Supporting Collaboration and Adaptation in a Learning Environment), which aims to serve leaning an...
Maria Grigoriadou, Evangelia Gouli, Agoritsa Gogou...
SIGCSE
2005
ACM
108views Education» more  SIGCSE 2005»
14 years 1 months ago
Teaching and learning ethics in computer science: walking the walk
The author shares techniques used in a successful "Ethics and Professionalism" class at California State University, San Bernardino. The author describes active learning...
Richard J. Botting
ICALT
2008
IEEE
14 years 2 months ago
Multisensory Games for Dyslexic Children
A significant problem faced by dyslexic children is a lack of learning technologies designed to help children learn in settings when there is no personal teaching assistance. This...
James Ohene-Djan, Rahima Begum