Works Published in 2015

search works

Displaying works 1 - 20 of 26 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2015 conference paper

EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning

Proceedings of the USENIX Security Symposium, 351–366. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen

By: R. Wang, W. Enck, D. Reeves, X. Zhang, P. Ning, D. Xu, W. Zhou, A. Azab

Event: USENIX Security Symposium at Washington, D.C.

Source: NC State University Libraries
Added: January 13, 2024

2015 conference paper

Multitasking Increases Stress and Insecure Behavior on Mobile Devices

Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59(1), 1110–1114.

By: Q. Liu, A. McLaughlin, B. Watson, W. Enck & A. Davis

Event: SAGE Publications

Source: ORCID
Added: January 2, 2024

2015 conference paper

Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities

Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 325–336.

By: J. Gionta, W. Enck & P. Ning

Event: ACM

Source: ORCID
Added: January 2, 2024

2015 conference paper

Effects of reflection type in here and now mobile learning

American Educational Research Association. Presented at the American Educational Research Association, Chicago, IL.

By: F. Martin & J. Ertzberger

Event: American Educational Research Association at Chicago, IL

Source: NC State University Libraries
Added: August 30, 2022

2015 conference paper

Using emerging instructional technologies to enhance clinical training

Medical device clinical training & education conference. Presented at the Medical device clinical training & education conference, Charlotte, NC.

By: F. Martin

Event: Medical device clinical training & education conference at Charlotte, NC

Source: NC State University Libraries
Added: August 30, 2022

2015 conference paper

Blended delivery format for introductory language courses at the university level

Foreign Language Association of North Carolina Conference. Presented at the Foreign Language Association of North Carolina Conference, Wilmington, NC.

By: J. Galbraith, F. Martin, E. Irvin & P. Gonzalez

Event: Foreign Language Association of North Carolina Conference at Wilmington, NC

Source: NC State University Libraries
Added: August 30, 2022

2015 conference paper

Using learning analytics to enhance online learning

Distance Teaching and Learning Conference. Presented at the Distance Teaching and Learning Conference, Madison, WI.

By: F. Martin & P. Wilkins

Event: Distance Teaching and Learning Conference at Madison, WI

Source: NC State University Libraries
Added: August 30, 2022

2015 journal article

Memoir writing instruction in an asynchronous format: A design and development research project

Journal of Applied Instructional Design, 5(1), 5–21.

By: R. Robinson & F. Martin

Source: NC State University Libraries
Added: August 30, 2022

2015 conference paper

Enhancing student learning and engagement in online courses by using learning analytics data

Online Learning Consortium. Presented at the Online Learning Consortium, Orlando, FL.

By: F. Martin & P. Wilkins

Event: Online Learning Consortium at Orlando, FL

Source: NC State University Libraries
Added: August 30, 2022

2015 conference paper

Reflecting with a virtual expert in the here and now mobile learning environment

Association for Educational Communications and Technology Conference. Presented at the Association for Educational Communications and Technology Conference, Indianapolis, IN.

By: F. Martin & J. Ertzberger

Event: Association for Educational Communications and Technology Conference at Indianapolis, IN

Source: NC State University Libraries
Added: August 30, 2022

2015 conference paper

Using learning analytics from Moodle to enhance student learning and engagement in online courses

Association for Educational Communications and Technology Conference. Presented at the Association for Educational Communications and Technology Conference, Indianapolis, IN.

By: F. Martin & P. Wilkins

Event: Association for Educational Communications and Technology Conference at Indianapolis, IN

Source: NC State University Libraries
Added: August 30, 2022

2015 conference paper

Assessing student learning in online courses using learning analytics

Online Learning Consortium. Presented at the Online Learning Consortium, Orlando, FL.

By: F. Martin

Event: Online Learning Consortium at Orlando, FL

Source: NC State University Libraries
Added: August 30, 2022

2015 journal article

An Exploratory Study on K-12 Teachers' Use of Technology and Multimedia in the Classroom

i-Manager's Journal of Educational Technology, 12(1), 7–14.

By: F. Martin* & M. L. Carr

TL;DR: Examination of K-12 teachers' use of technology and multimedia in the classroom in two southern counties in the Southeastern United States finds Powerpoint was still the most popular tool for creating multimedia followed by Youtube, which was used by about half of the respondents in this study. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Sources: Crossref, NC State University Libraries
Added: August 20, 2022

2015 journal article

The HPT Model Applied to a Yoga Studio's Performance

Performance Improvement, 54(1), 28–38.

By: J. Boykin, J. Leitheiser & F. Martin*

Sources: Crossref, NC State University Libraries
Added: August 20, 2022

2015 journal article

The HPT Model Applied to a Boutique-Style Online Retail Store

Performance Improvement, 54(7), 26–33.

By: R. Hayes*, C. Godwin*, D. Butts* & F. Martin*

Sources: Crossref, NC State University Libraries
Added: August 20, 2022

2015 chapter

E-learning design— From instructional events to elements

In International Handbook of E-learning Volume 1: Theoretical Perspectives and Research (pp. 153–170).

By: F. Martin

Contributors: F. Martin

TL;DR: Covering history, design models, instructional strategies, best practices, competencies, evaluation, assessment, and more, these twenty-seven contributions tackle the tremendous potential and flexibility inherent to this rapidly growing new paradigm. (via Semantic Scholar)
Source: ORCID
Added: August 15, 2022

2015 chapter

Round-Optimal Black-Box Two-Party Computation

In Lecture Notes in Computer Science (pp. 339–358).

By: R. Ostrovsky*, S. Richelson* & A. Scafuro*

TL;DR: Katz and Ostrovsky prove that 5 rounds are necessary for secure two-party protocols (4-round are sufficient if only one party receives the output) and provide a protocol that matches such lower bound. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: February 24, 2020

2015 chapter

Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way

In Theory of Cryptography (pp. 345–374).

By: R. Ostrovsky*, A. Scafuro* & M. Venkitasubramanian*

TL;DR: In their work it is shown that resettably-sound ZK arguments require nonblack- box simulation techniques, and the first construction based on the breakthrough simulation technique of Barak is provided. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2015 conference paper

Counterfeit detection using paper PUF and mobile cameras

2015 IEEE International Workshop on Information Forensics and Security (WIFS). Presented at the IEEE.

By: C. Wong* & M. Wu*

Event: IEEE

TL;DR: This work shows that images captured by mobile cameras can be directly used for authentication by exploiting the camera flashlight to create a semi-controlled lighting condition and proposes new algorithms to demonstrate that the microscopic normal vector field of paper surface can be estimated by using multiple camera-captured images of different viewpoints. (via Semantic Scholar)
Source: ORCID
Added: February 22, 2019

2015 conference paper

A Study on PUF characteristics for counterfeit detection

2015 IEEE International Conference on Image Processing (ICIP), 1643–1647.

By: C. Wong* & M. Wu*

Event: IEEE

TL;DR: A study to gain a better understanding in the factors affecting the authentication performance, with a consideration of the friendliness under mobile imaging finds that the density of foreground objects have a dominant impact on the Authentication performance. (via Semantic Scholar)
Source: ORCID
Added: February 22, 2019

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.