eAssessment by using a Trustworthy System in Blended and Online Institutions
暂无分享,去创建一个
[1] Tsuyoshi Murata,et al. {m , 1934, ACML.
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] Gary Wills,et al. User Security Issues in Summative E-Assessment Security , 2010 .
[4] I. Bulatov,et al. The Use of E-assessment in Chemical Engineering Education , 2007 .
[5] Imane Aly Saroit,et al. A Smart Approach for Bimodal Biometric Authentication in Home-Exams (SABBAH Model) , 2012 .
[6] Sébastien Marcel,et al. Impact of Score Fusion on Voice Biometrics and Presentation Attack Detection in Cross-Database Evaluations , 2017, IEEE Journal of Selected Topics in Signal Processing.
[8] Sally Jordan,et al. eAssessment and the independent learner , 2009 .
[9] Jewel Wambui Gathuri,et al. Impersonation Challenges Associated With E-Assessment of University Students , 2014 .
[10] Nils Jensen,et al. Software for E-Assessment of Programming Exercises , 2012, GI-Jahrestagung.
[11] J. W. Gikandi,et al. Online formative assessment in higher education: A review of the literature , 2011, Comput. Educ..
[12] Paulo Pinto,et al. Free Typed Text Using Keystroke Dynamics for Continuous Authentication , 2014, Communications and Multimedia Security.
[13] Maja Pantic,et al. Coupled Gaussian processes for pose-invariant facial expression recognition , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Hugo Jair Escalante,et al. Term-weighting learning via genetic programming for text classification , 2014, Knowl. Based Syst..
[15] Norman Vaughan,et al. Student Engagement and Blended Learning: Making the Assessment Connection , 2014 .