Sciweavers

790 search results - page 52 / 158
» Second life and education
Sort
View
SIGCSE
2006
ACM
130views Education» more  SIGCSE 2006»
14 years 2 months ago
Scavenger hunt: computer science retention through orientation
This paper describes Scavenger Hunt, a team-based orientation activity for incoming freshmen in the Department of Computer Science at the University of Illinois at Urbana-Champaig...
Jerry O. Talton, Daniel L. Peterson, Sam Kamin, De...
FC
2007
Springer
105views Cryptology» more  FC 2007»
14 years 3 months ago
Phishing IQ Tests Measure Fear, Not Ability
We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from exist...
Vivek Anandpara, Andrew Dingman, Markus Jakobsson,...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 9 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
AAAI
2000
13 years 10 months ago
ADVISOR: A Machine Learning Architecture for Intelligent Tutor Construction
We have constructed ADVISOR, a two-agent machine learning architecture for intelligent tutoring systems (ITS). The purpose of this architecture is to centralize the reasoning of a...
Joseph Beck, Beverly Park Woolf, Carole R. Beal
ERCIMDL
2009
Springer
89views Education» more  ERCIMDL 2009»
14 years 3 months ago
Improving Annotations in Digital Documents
Annotation plays a major role in a user’s reading of a document: from elementary school students making notes on text books to professors marking up their latest research papers....
Jennifer Pearson, George Buchanan, Harold W. Thimb...