Sciweavers

269 search results - page 7 / 54
» Who Thinks Who Knows Who
Sort
View
CCS
2009
ACM
14 years 7 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
LWA
2007
13 years 8 months ago
Taking the Teacher's Perspective for User Modeling in Complex Domains
Serious games that should adapt training to the individual might benefit from methods that are developed for intelligent tutoring systems. One method, model tracing, might be used...
Christian P. Janssen, Hedderik van Rijn
SIGUCCS
2000
ACM
13 years 11 months ago
Different Strokes for Teaching Folks
What differentiates technology-using teachers from the rest of your users? How can you best address their special needs? How will you know if you are successful in your approach? ...
Paul Hyde, John F. Hall
SIGCSE
2010
ACM
175views Education» more  SIGCSE 2010»
13 years 11 months ago
MPCT: media propelled computational thinking
Media-Propelled Computational Thinking (MPCT – pronounced impact) is a course designed to introduce programming in the context of engaging problems in media computation, math, a...
Eric Andrew Freudenthal, Mary K. Roy, Alexandria N...
SIGMOD
2009
ACM
190views Database» more  SIGMOD 2009»
14 years 7 months ago
Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason
We are experiencing a new Social Web, where people share, communicate, commiserate, and conflict with each other. As evidenced by systems like Wikipedia, twitter, and delicious.co...
Ed H. Chi