Search results for "Software"
showing 10 items of 7396 documents
Location-based media sharing in a MP2P network
2008
In both academia and industry, peer-to-peer (p2p) applications have attracted great attention. This paper introduces and implemented a novel location-based multimedia application, the Multimedia Traveling Journal application (PhotoJournal) that employs the p2p paradigm and enables location-based content sharing among mobile users.
User requirements and resource control for cooperative multimedia applications
1997
The spread of distributed multimedia applications is setting forth a new set of challenges in the management of host and network resources for guaranteeing Quality of Service (QoS). When the multimedia applications compete for resources as in the case of a cooperative multimedia environment, the management task becomes even more difficult. In this work, we first discuss QoS for multimedia applications. We then present the architectural and implementation details of a Cooperative Multimedia Environment (CME) made up of Cooperative Multimedia Applications (COMMA), one for each user. A COMMA presents a user with a single interface that allows him to invite other users to a cooperative session,…
Developing web-based learning resources in school education: a user-centered approach
2010
Published version of an article from the journal:Interdisciplinary Journal of Knowledge and Learning Objects. Also available from the publisher:http://www.ijello.org/Volume6/IJELLOv6p115-135Hadjerrouit688.pdf Web-based learning resources (WBLRs) are potentially powerful tools for enhancing teachingand learning processes in school education. They can provide teachers and learners with a widerange of new and exciting experiences that are not possible in a traditional classroom. However,WBLRs are still the domain of technical and software experts rather than teachers and learners.As a result, much of the development of WBLRs is carried out without a true understanding ofissues pertinent to lea…
Integrating New Open Source Assessment Tools into dotLearn LMS
2010
The convergence process initiated by the European Higher Education Space (EHES) has changed the approach to the teaching and learning process focusing largely on monitoring the progress of the student. This task can be simplified with the proper use of tools integrated in the universities’ Learning Management Systems (LMS). Most of these platforms have modules for managing the evaluation and to create online examinations. However, they do not tend to contemplate ways of evaluation depending on the subjects taught. This chapter presents a tool for continuous evaluation of a variety of subjects and their integration into a LMS based on open source. In the University of Valencia’s particular c…
Keynote speakers: Benefits and drawbacks of the BigData era
2017
We have voluntarily surrendered our private data to BigData companies like Google and FaceBook in hope that our data there will be safe and will be used only for ethical machine learning purposes to further advance artificial intelligence capabilities we already use daily: smart search, machine translation, speech recognition, guessing our interests etc. But alongside these positive BigData uses, unexpectedly the world was recently astounded by the success of the DataScience killer-application: microtargeting, discussed in this presentation.
A mobile agent tool for resource discovery
2004
Publisher Summary This chapter discusses a mobile agent based tool for arranging communities whose members want to share computing resources. Such a tool enables community members to arrange their own parallel virtual machine, using resources available within the community. Mobile agents are used to search among available addresses inside the community, and are instructed to select the ones which correspond to the users' requirements. The agent is the key component of the system, because it takes care of the server availability test and of the decision on whether to include them into the virtual machine, according to the user's requirements. The database acts as an intermediary between the …
Role Scripting as a Tool to Foster Transactivity of Asynchronous Student Discussions
2021
Transactivity of student discussions is crucial in computer-supported collaborative learning (CSCL). However, CSCL learners often lack well-developed argumentation and negotiation skills, which makes it challenging for them to engage in and maintain a transactive discussion. Collaboration scripts have been implemented in CSCL contexts and have demonstrated positive effects on students' collaboration and argumentation skills. Yet, the degree of transactivity of student interactions is rarely addressed directly in CSCL research. Employing a qualitative content analysis approach, this study seeks to understand how a role script affects the transactivity of students' argumentative knowledge co-…
Scripting Computer-Supported Collaborative Learning
2010
In this chapter, we will present a review of theoretical and empirical analyses of Web-based collaboration processes used during a scripted university course. The results refer to a design-based study that involved first-year teacher-education students (N = 30) studying pedagogy over a period of three months. The intervention involved structuring the subjects’ collaborative actions with three different pedagogical scripts. According to the findings, the scripts guided students’ activities by helping them find resources for knowledge construction and work together through a series of steps. However, there were variations among groups in terms of quality of collaboration, and the students mos…
Security Implications of Using Third-Party Resources in the World Wide Web
2018
Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…