352,618 research outputs found

    From the sage on the stage to what exactly? Description and the place of the moderator in coā€operative and collaborative learning

    Get PDF
    This paper reports a significant finding from a twoā€year study of computer conferencing used to deliver a course unit at a UK university. Computer conferencing has been applied to education alongside a concern to develop coā€operative and collaborative learning strategies. The technology of computer conferencing has been identified as especially appropriate to a coā€operative style of work. This study found that far from collaboration being an outcome of the deployment of computer conferencing it became in some sense the problem. A common ā€˜glossā€™ on the educational changes that are taking place, with the introduction of new technologies for teaching and learning, is that the ā€˜sage on the stageā€™ is being replaced by ā€˜the guide on the sideā€™. This paper argues that this opposition rests on little substantial evidence or research. The moderator/facilitator role advocated as suitable for computer conferencing is shown to be deeply embedded in wider social actions. The orientations of the tutor are heavily inclined towards the demands of assessment. Successful computerā€supported collaborative learning (CSCL) is the outcome of the coā€operative work of all the members of the conference. The application of CSCL relies upon timely interventions by the tutor

    Cryptanalysis of two mutual authentication protocols for low-cost RFID

    Full text link
    Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.Comment: 17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel system

    Regulating Search Warrant Execution Procedure for Stored Electronic Communications

    Get PDF
    Electronic communication services, from email, to social media, tomessaging applications, have not only dramatically changed daily life but have also had a profound impact on criminal investigations and procedure.The often large volume of electronically stored information has led to a two-step process for search warrant execution, codified in Federal Criminal Procedure Rule 41. When conducting a search pursuant to Rule 41, law enforcement often retains both responsive itemsā€”materials that fall within the scope of the warrantā€”and nonresponsive materialsā€”intermingled items that can be searched, but ultimately exceed the scope of the warrant. This possession of nonresponsive material creates a tension between the account holderā€™s privacy interests and the governmentā€™s ability to conduct an effective search.Courts and scholars have implemented and proposed a range of approaches for search warrant execution inlight of concerns about sweeping general searches and the practicalities of searching electronically stored information. This Note examines these approaches to regulate search warrant execution procedure in the context of stored electronic communications. This Note also discusses the strengths and shortcomings of these various mechanisms and concludes that Rule 41 should be amended to provide standards for the retention and use of nonresponsive material

    VCU Media Lab

    Get PDF
    We propose the establishment of a VCU Media Lab ā€“ a professional creative media technology unit whose mission is to support the development, design, production and delivery of innovative media, multimedia, computer-based instruction, publications and tools in support of VCU education, research and marketing initiatives. This centrally administered, budgeted and resourced facility will acknowledge, refine, focus and expand media services that are currently being provided at VCU in a decentralized manner

    APHRODITE: an Anomaly-based Architecture for False Positive Reduction

    Get PDF
    We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input traffic. Benchmarks show a substantial reduction of false positives and that APHRODITE is effective also after a "quick setup", i.e. in the realistic case in which it has not been "trained" and set up optimall
    • ā€¦
    corecore