Displaying works 1 - 20 of 26 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2015 conference paper
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning
Proceedings of the USENIX Security Symposium, 351–366. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen
Event: USENIX Security Symposium at Washington, D.C.
2015 conference paper
Multitasking Increases Stress and Insecure Behavior on Mobile Devices
Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59(1), 1110–1114.
Event: SAGE Publications
2015 conference paper
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 325–336.
Event: ACM
2015 conference paper
Effects of reflection type in here and now mobile learning
American Educational Research Association. Presented at the American Educational Research Association, Chicago, IL.
Event: American Educational Research Association at Chicago, IL
2015 conference paper
Using emerging instructional technologies to enhance clinical training
Medical device clinical training & education conference. Presented at the Medical device clinical training & education conference, Charlotte, NC.
Event: Medical device clinical training & education conference at Charlotte, NC
2015 conference paper
Blended delivery format for introductory language courses at the university level
Foreign Language Association of North Carolina Conference. Presented at the Foreign Language Association of North Carolina Conference, Wilmington, NC.
Event: Foreign Language Association of North Carolina Conference at Wilmington, NC
2015 conference paper
Using learning analytics to enhance online learning
Distance Teaching and Learning Conference. Presented at the Distance Teaching and Learning Conference, Madison, WI.
Event: Distance Teaching and Learning Conference at Madison, WI
2015 journal article
Memoir writing instruction in an asynchronous format: A design and development research project
Journal of Applied Instructional Design, 5(1), 5–21.
2015 conference paper
Enhancing student learning and engagement in online courses by using learning analytics data
Online Learning Consortium. Presented at the Online Learning Consortium, Orlando, FL.
Event: Online Learning Consortium at Orlando, FL
2015 conference paper
Reflecting with a virtual expert in the here and now mobile learning environment
Association for Educational Communications and Technology Conference. Presented at the Association for Educational Communications and Technology Conference, Indianapolis, IN.
Event: Association for Educational Communications and Technology Conference at Indianapolis, IN
2015 conference paper
Using learning analytics from Moodle to enhance student learning and engagement in online courses
Association for Educational Communications and Technology Conference. Presented at the Association for Educational Communications and Technology Conference, Indianapolis, IN.
Event: Association for Educational Communications and Technology Conference at Indianapolis, IN
2015 conference paper
Assessing student learning in online courses using learning analytics
Online Learning Consortium. Presented at the Online Learning Consortium, Orlando, FL.
Event: Online Learning Consortium at Orlando, FL
2015 journal article
An Exploratory Study on K-12 Teachers' Use of Technology and Multimedia in the Classroom
i-Manager's Journal of Educational Technology, 12(1), 7–14.
2015 journal article
The HPT Model Applied to a Yoga Studio's Performance
Performance Improvement, 54(1), 28–38.
2015 journal article
The HPT Model Applied to a Boutique-Style Online Retail Store
Performance Improvement, 54(7), 26–33.
2015 chapter
E-learning design— From instructional events to elements
In International Handbook of E-learning Volume 1: Theoretical Perspectives and Research (pp. 153–170).
Contributors: F. Martin
2015 chapter
Round-Optimal Black-Box Two-Party Computation
In Lecture Notes in Computer Science (pp. 339–358).
2015 chapter
Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way
In Theory of Cryptography (pp. 345–374).
2015 conference paper
Counterfeit detection using paper PUF and mobile cameras
2015 IEEE International Workshop on Information Forensics and Security (WIFS). Presented at the IEEE.
Event: IEEE
2015 conference paper
A Study on PUF characteristics for counterfeit detection
2015 IEEE International Conference on Image Processing (ICIP), 1643–1647.
Event: IEEE
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.