Displaying works 1 - 20 of 23 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2010 conference paper
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Proceedings of the 9th USENIX conference on Operating systems design and implementation, 1–6.
Event: USENIX Association
2010 journal article
Not so great expectations: Why application markets haven't failed security
IEEE Security & Privacy, 8(5), 76–78.
2010 conference paper
Teaching multimedia production curricula effectively: Identifying essential competencies and skills of instructional design and technology professionals
Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Anaheim, CA.
Event: Association of Educational Communications and Technology Conference at Anaheim, CA
2010 conference paper
Adoption of virtual classrooms for online courses in higher education
Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Anaheim, CA.
Event: Association of Educational Communications and Technology Conference at Anaheim, CA
2010 conference paper
Interactive technologies for synchronous online teaching
Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Anaheim, CA.
Event: Association of Educational Communications and Technology Conference at Anaheim, CA
2010 journal article
Game play is important for learning
Learning and Leading with Technology, 38(1), 28–30.
2010 journal article
Multimedia competencies for educational technologist. A survey of professionals and job announcement analysis
Journal of Educational Multimedia and Hypermedia, 19(4), 421–449.
2010 journal article
Using virtual classrooms: Student perceptions of features and characteristics in an online and a blended Course
Journal of Online Learning and Teaching, 6(1), 135–147.
2010 journal article
Do you teach in a virtual classroom? Measuring student's perceptions of the features and characteristics
International Journal of Instructional Technology and Distance Learning, 7(12), 17–28.
2010 journal article
Effects of a 3-D video game on middle school student achievement and attitude in mathematics
Electronic Journal of Mathematics and Technology, 4(1), 68–80.
2010 journal article
Influence of Learning Management Systems Self-efficacy on E-learning Performance
i-Manager's Journal on School Educational Technology, 5(3), 26–35.
2010 conference paper
Synchronous virtual classrooms: Student perceptions from an online and blended education course
2010 International Conference on Technology for Education, T4E 2010, 93–100.
Contributors: M. Parker * & F. Martin*
2010 conference paper
Synchronous technologies for online teaching
2010 International Conference on Technology for Education, T4E 2010, 1–4.
Contributors: F. Martin* & D. Noonan*
2010 conference paper
Best practices for teaching in a synchronous virtual classroom
Association of Educational Communications and Technology Conference, 44–46.
Contributors: F. Martin*
Event: Association of Educational Communications and Technology Conference at Anaheim, CA
2010 chapter
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
In F. Massacci, D. Wallach, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2010 (pp. 192–200).
Ed(s): F. Massacci, D. Wallach & N. Zannone
2010 thesis
Adaptive integer kernels and dyadic approximation error analysis for state-of-the-art video codecs
The Hong Kong Polytechnic University.
2010 chapter
Impossibility Results for RFID Privacy Notions
In Transactions on Computational Science XI (pp. 39–63).
2010 chapter
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
In Computer Security – ESORICS 2010 (pp. 663–678).
2010 journal article
malnets: large-scale malicious networks via compromised wireless access points
Security and Communication Networks, 3(2-3), 102–113.
2010 article
Guest editorial: Special issue on software reliability engineering
Williams, L. (2010, August). EMPIRICAL SOFTWARE ENGINEERING, Vol. 15, pp. 321–322.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.