Increasingly, learning environments are opening the learner model to the user it represents. This paper describes a study in which students were able to create their own presentati...
Traditional nonlinear filtering techniques are observed in underutilization of blur identification techniques, and vice versa. To improve blind image restoration, a designed edg...
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
This report describes experiences of introducing executable acceptance testing in senior software engineering courses. Students in an agile environment completed a five-iteration ...
For effective cooperation, sharing of resources, a good social climate and therefore better learning, students need to maintain awareness of the social situation in a group or a c...