The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information and communication technologies play an increasingly important role in society, in the sense that all areas and professions make use of digital resources. The school can not be brushed off this reality, aim to create full subjects and integrated in society today. Educational software can be used very early in the education of children, but they must be carefully and monitoring. This article...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
Serious games are an emerging technology that is growing in importance, providing benefits beyond pure entertainment in order to improve the users' realistic experience. Nowadays, there is increasing concern for people with cognitive troubles. Their cognitive capabilities could be improved so they can lead a better life. Serious games have great potential in stimulating cognitive abilities for different...
This study addresses the roles of self-regulation, co-regulation, and socially shared regulation in computer supported collaborative learning environment. An empirical study was conducted with 19 groups of university students working on computer virus prevention tasks. The results indicated that self-regulation, co-regulation, and socially shared regulation occurred during collaborative learning....
In this multi-disciplinary project, we intend to explore the advantages of an information fusion system in which the infrastructure finds new ways to reflect upon its own state and new ways to express this state that provides a good fit to human communication and cognition processes. This interplay should then generate a better and more responsive humancomputer symbiosis. The outcomes of this project...
Network security analysts presently lack tools for routinely screening large collections of network traffic for structures of interest. This is particularly the case when the structures of interest are embodied as summaries of sets of related traffic, essentially behaviour descriptions. This paper sketches a methodology to provide such capability, in the context of flow data. The methodology generates...
Benchmarking numerous programs in a reasonable time requires the use of several (potentially multicore) computers. We experimented such a situation in the context of the MCC (Model Checking Contest @ Petri net) where we had to operate more than 52000 runs for the 2013 edition. This paper presents BenchKit, a tool to operate programs on sets of potentially parallel machines and to gather monitoring...
With the development of 3D display technology, the effect of 3D display attracts more and more attention. Vertical parallax is one of main factors that cause visual fatigue, and its evaluation methods are all subjective. In this paper, we investigate the use of electroencephalography (EEG) as a tool to evaluate vertical parallax, measuring the EEG response signal by presenting a series levels of vertical...
In this paper we explore the design of Leyline, a provenance-based desktop search and file management system, both on a conceptual and user interface level. We start with a comparative analysis and classification of previous provenance based search systems, examining their underlying assumptions and focus, search coverage and flexibility, as well as features and limitations. We then describe a novel...
Auto dynamic difficulty is the technique of automatically changing the level of difficulty of a video game in real time to match player expertise. In this paper, we describe a collection of software design patterns for enabling auto dynamic difficulty in video games. The benefits of a design pattern approach include more reusability and lower risk compared to traditional ad hoc approaches. We implemented...
Accounting information system composes the most important part in management information systems because accounting is stated as the language of a management. Thereby, accounting information obtained from accounting information system is a kind of basic knowledge for the efficient management system. In particular, data gained from the accounting system with computer base ensures extremely important...
This article presents a capstone project (CP) approach based on a two-semester effort developed individually to build up and reinforce skills fostered during a computer-engineering curriculum. The CP result is an artifact to be inserted in a context, which is developed, under guidance and monitoring. Besides the student, there are other three roles involved: the advisor for methodological issues;...
This study aims at investigating how learners use various self- and co-regulated learning behaviours in a computer supported collaborative learning environment. A questionnaire was developed to measure students' usage of co-regulated learning behaviours. It is envisioned that the results of this study will inform the science educators in the development of future computer supported collaborative learning...
Learning with Computer Based Learning Environments changes habits, especially for teachers. In this paper, we want to demonstrate how to supply the teacher with understandable feedback on the on-going activity and to offer the appropriate tools to react on the environment. We propose to develop interactive indicators based on activity traces left by the users and use them to regulate the learning...
Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised computers called stepping-stones. Some intruders even manipulate a stepping-stone to evade stepping-stone intrusion detection. Intruders' evasion makes detecting stepping-stone intrusion more difficult. In this paper, we propose...
As a kind of invisible spyware that records user's keystrokes, software keyloggers have posed a great threat to user privacy and security. It is difficult to detect keyloggers because they run in a hidden mode. In this paper, an immune-inspired dendritic cell algorithm (DCA) was used to detect the existence of keyloggers on an infected host machine. The basis of the detection is facilitated through...
Trust is often calculated based on evidence which may come from a set of diverse sources. Challenges in trust calculation include the lack of a standard way to access evidence sources, lack of a standard for presenting evidence, unreliable evidence sources and differences of opinion on how evidence should be interpreted. This work shows that there are aspects of trust calculation that can be abstracted...
Educational computer games are presently a hot topic in research and development. The idea of utilizing the motivational potential and the rich virtual worlds of today's computer games is teasing educators as well as technicians. Fully exploiting the educational potential of computer games requires a strong personalization and adaptation to the individual needs and preferences. In the context of games,...
We are soon approaching the pervasive-era of computing, where computers are embedded into objects and the environment in order to provide new services to users. Significant levels of data are required in order for these services to function as intended, and it is this collection of data which we refer to as ubiquitous monitoring. Existing monitoring techniques have often been known to cause undesirable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.