Z Generation and Fortnite: New Ethical Paradigms in Video Games Design | 0 | 0.34 | 2019 |
The quest for a better tailoring of gameful design: An analysis of player type preferences | 1 | 0.35 | 2019 |
The use of digital games to teaching computer graphics: An open opportunity. | 0 | 0.34 | 2018 |
Effect of personalized gameful design on student engagement. | 1 | 0.35 | 2018 |
An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives. | 0 | 0.34 | 2018 |
Gamification: a systematic review of design frameworks. | 8 | 0.65 | 2017 |
Open Proctor: An Academic Integrity Tool for the Open Learning Environment. | 0 | 0.34 | 2017 |
A Method for Thematic and Structural Visualization of Academic Content | 0 | 0.34 | 2017 |
Gamification of cognitive training: a crowdsourcing-inspired approach for older adults. | 0 | 0.34 | 2016 |
Designing game-like activities to engage adult learners in higher education. | 0 | 0.34 | 2016 |
A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment | 2 | 0.39 | 2016 |
A Literature Review of Gamification Design Frameworks | 28 | 1.40 | 2015 |
Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services. | 0 | 0.34 | 2015 |
FRAGGLE: A FRamework for AGile Gamification of Learning Experiences. | 1 | 0.36 | 2015 |
AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices. | 0 | 0.34 | 2015 |
ValID: A Trust-Based Virtual Assessment System | 1 | 0.36 | 2014 |
Anonymously accessing JXTA community services through split message forwarding. | 2 | 0.34 | 2013 |
A Study on Practices against Malware in Free Software Projects | 1 | 0.35 | 2013 |
Analysis of the Forensic Traces Left by AirPrint in Apple iOS Devices | 2 | 0.43 | 2013 |
Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar | 0 | 0.34 | 2012 |
Jxtanonym: An Anonymity Layer For Jxta Services Messaging | 3 | 0.41 | 2012 |
Split Message-Based Anonymity for JXTA Applications | 2 | 0.38 | 2012 |
jxSensor: A Sensor Network Integration Layer for JXTA | 1 | 0.34 | 2012 |
Versatile iPad forensic acquisition using the Apple Camera Connection Kit | 4 | 0.49 | 2012 |
Towards secure mobile P2P applications using JXME. | 0 | 0.34 | 2012 |
An Anonymity Layer for JXTA Services | 0 | 0.34 | 2011 |
The impact of security on voip call quality | 0 | 0.34 | 2011 |
Lightweight Security for JXME-Proxied Relay Authentication | 0 | 0.34 | 2011 |
Universal, Fast Method for iPad Forensics Imaging via USB Adapter | 3 | 0.72 | 2011 |
JXTA Security in Mobile Constrained Devices | 1 | 0.38 | 2010 |
Application of JXTA-overlay platform for secure robot control | 4 | 0.49 | 2010 |
VoIP: making secure calls and maintaining high call quality | 3 | 0.66 | 2010 |
JXTA resource access control by means of advertisement encryption | 2 | 0.40 | 2010 |
XML-based security for JXTA core protocols | 0 | 0.34 | 2010 |
A Secure JXTA-Overlay Platform for Robot Control | 0 | 0.34 | 2010 |
JXTA-Overlay P2P Platform and Its Application for Robot Control | 0 | 0.34 | 2010 |
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys | 7 | 0.62 | 2010 |
A Security Layer For Jxta Core Protocols | 2 | 0.37 | 2009 |
Experimental Results and Evaluation of SmartBox Stimulation Device in a P2P E-learning System | 7 | 0.58 | 2009 |
A survey on security in JXTA applications | 11 | 0.78 | 2009 |
A Security Framework for JXTA-Overlay | 1 | 0.43 | 2009 |
A Security-Aware Approach to JXTA-Overlay Primitives | 1 | 0.43 | 2009 |
Securing a Java P2P framework: the JXTA-overlay case | 0 | 0.34 | 2009 |
Maintaining Unlinkability in Group Based P2P Environments | 0 | 0.34 | 2009 |
Persistent Interoperable Security for JXTA Advertisements | 9 | 0.70 | 2008 |
Collaborative Group Membership And Access Control For Jxta | 3 | 0.39 | 2008 |
An Integrated Structure For A Virtual Networking Laboratory | 20 | 1.40 | 2008 |
Providing a collaborative mechanism for peer group access control | 3 | 0.50 | 2006 |