352,618 research outputs found
From the sage on the stage to what exactly? Description and the place of the moderator in coāoperative and collaborative learning
This paper reports a significant finding from a twoāyear study of computer conferencing used to deliver a course unit at a UK university. Computer conferencing has been applied to education alongside a concern to develop coāoperative and collaborative learning strategies. The technology of computer conferencing has been identified as especially appropriate to a coāoperative style of work. This study found that far from collaboration being an outcome of the deployment of computer conferencing it became in some sense the problem. A common āglossā on the educational changes that are taking place, with the introduction of new technologies for teaching and learning, is that the āsage on the stageā is being replaced by āthe guide on the sideā. This paper argues that this opposition rests on little substantial evidence or research. The moderator/facilitator role advocated as suitable for computer conferencing is shown to be deeply embedded in wider social actions. The orientations of the tutor are heavily inclined towards the demands of assessment. Successful computerāsupported collaborative learning (CSCL) is the outcome of the coāoperative work of all the members of the conference. The application of CSCL relies upon timely interventions by the tutor
Cryptanalysis of two mutual authentication protocols for low-cost RFID
Radio Frequency Identification (RFID) is appearing as a favorite technology
for automated identification, which can be widely applied to many applications
such as e-passport, supply chain management and ticketing. However, researchers
have found many security and privacy problems along RFID technology. In recent
years, many researchers are interested in RFID authentication protocols and
their security flaws. In this paper, we analyze two of the newest RFID
authentication protocols which proposed by Fu et al. and Li et al. from several
security viewpoints. We present different attacks such as desynchronization
attack and privacy analysis over these protocols.Comment: 17 pages, 2 figures, 1 table, International Journal of Distributed
and Parallel system
Regulating Search Warrant Execution Procedure for Stored Electronic Communications
Electronic communication services, from email, to social media, tomessaging applications, have not only dramatically changed daily life but have also had a profound impact on criminal investigations and procedure.The often large volume of electronically stored information has led to a two-step process for search warrant execution, codified in Federal Criminal Procedure Rule 41. When conducting a search pursuant to Rule 41, law enforcement often retains both responsive itemsāmaterials that fall within the scope of the warrantāand nonresponsive materialsāintermingled items that can be searched, but ultimately exceed the scope of the warrant. This possession of nonresponsive material creates a tension between the account holderās privacy interests and the governmentās ability to conduct an effective search.Courts and scholars have implemented and proposed a range of approaches for search warrant execution inlight of concerns about sweeping general searches and the practicalities of searching electronically stored information. This Note examines these approaches to regulate search warrant execution procedure in the context of stored electronic communications. This Note also discusses the strengths and shortcomings of these various mechanisms and concludes that Rule 41 should be amended to provide standards for the retention and use of nonresponsive material
VCU Media Lab
We propose the establishment of a VCU Media Lab ā a professional creative media technology unit whose mission is to support the development, design, production and delivery of innovative media, multimedia, computer-based instruction, publications and tools in support of VCU education, research and marketing initiatives. This centrally administered, budgeted and resourced facility will acknowledge, refine, focus and expand media services that are currently being provided at VCU in a decentralized manner
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in
network intrusion detection systems. APHRODITE works by detecting anomalies in
the output traffic, and by correlating them with the alerts raised by the NIDS
working on the input traffic. Benchmarks show a substantial reduction of false
positives and that APHRODITE is effective also after a "quick setup", i.e. in
the realistic case in which it has not been "trained" and set up optimall
- ā¦