A massive data processing approach for effective trustworthiness in online learning groups
暂无分享,去创建一个
Fatos Xhafa | Santi Caballé | Jorge Miguel | Josep Prieto | F. Xhafa | S. Caballé | Jorge Miguel | Josep Prieto
[1] Susan K. Ferencz,et al. Privacy Issues in a Virtual Learning Environment. , 1998 .
[2] Miroslaw Malek,et al. Comprehensive logfiles for autonomic systems , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[3] Fatos Xhafa,et al. A Grid Approach to Efficiently Embed Information and Knowledge about Group Activity into Collaborative Learning Applications , 2008, The Learning Grid Handbook.
[4] Georgios Kambourakis,et al. A PKI approach for deploying modern secure distributed e-learning and m-learning environments , 2007, Comput. Educ..
[5] Santi Caballé,et al. Providing Security to Computer-Supported Collaborative Learning: An Overview , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[6] Christian J. Eibl. Privacy and Confidentiality in E-Learning Systems , 2009, 2009 Fourth International Conference on Internet and Web Applications and Services.
[7] Santi Caballé,et al. Information Security in Support for Mobile Collaborative Learning , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.
[8] Timothy Koschmann,et al. Cscl : Theory and Practice of An Emerging Paradigm , 1996 .
[9] Zheng Wu,et al. A Taxonomy of Network and Computer Attacks Based on Responses , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.
[10] Elisa Bertino,et al. An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.
[11] Wolfgang Prinz,et al. What groupware functionality do users really use?: A study of collaboration within digital ecosystems , 2013, 2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST).
[12] Indrajit Ray,et al. A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.
[13] Fatos Xhafa,et al. A Grid-Aware Implementation for Providing Effective Feedback to On-Line Learning Groups , 2005, OTM Workshops.
[14] S Hailes,et al. Using Recommendations for Managing Trust in Distributed Systems , 1997 .
[15] Edgar R. Weippl. Security in e-learning , 2005, ELERN.
[16] Hossein Bidgoli. Key concepts, infrastructure, standards, and protocols , 2006 .
[17] Fatos Xhafa,et al. Distributed-based massive processing of activity logs for efficient user modeling in a Virtual Campus , 2013, Cluster Computing.
[18] Fatos Xhafa,et al. A parallel grid-based implementation for real-time processing of event log data of collaborative applications , 2010, Int. J. Web Grid Serv..
[19] Andreas Pfitzmann,et al. Privacy-Aware eLearning: Why and How , 2005 .
[20] Victor Ciesielski,et al. Data Mining of Web Access Logs From an Academic Web Site , 2003, HIS.
[21] Timothy Koschmann,et al. Paradigm Shift s and Instructional Technology , 1996 .
[22] Sayalee Narkhede,et al. HMR Log Analyzer: Analyze Web Application Logs Over Hadoop MapReduce , 2013 .
[23] Christian J. Eibl. Discussion of information security in e-learning , 2010 .
[24] Wolfgang Appelt. What groupware functionality do users really use? Analysis of the usage of the BSCW system , 2001, Proceedings Ninth Euromicro Workshop on Parallel and Distributed Processing.
[25] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .
[26] Santi Caballé,et al. Providing Information Security to MOOC: Towards Effective Student Authentication , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[27] P. Dillenbourg. What do you mean by collaborative learning , 1999 .
[28] Bruce Schneier,et al. The psychology of security , 2007, CACM.