This paper describes the use of the reflective journal in a computer programming course at the University of South Australia. We describe rationale for the journal relating it to ...
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Active engagement in the subject material has been strongly linked to deeper learning. In traditional teaching environments, even though the student might be presented with new con...
Web 2.0 is an emerging catch phrase and the applications associated with it shocked the traditional eLearning world. However, is this really all new and can it be considered suitab...
Martin Ebner, Andreas Holzinger, Hermann A. Maurer
Researchers in the eld of Distributed Arti cial Intelligence (DAI) have been developing e cient mechanisms to coordinate the activities of multiple autonomous agents. The need for...