Refine
Year of publication
Document Type
- Conference Proceeding (42)
- Article (20)
- Book (5)
- Part of a Book (4)
- Contribution to a Periodical (4)
- Master's Thesis (1)
- Preprint (1)
- Report (1)
Has Fulltext
- no (78) (remove)
Is part of the Bibliography
- no (78)
Keywords
Institute
Nowadays, teachers and students utilize different ICT devices for conducting innovative and educational activities from anywhere at any time. The enactment of these activities relies on robust communication and computational infrastructures used for supporting technological devices enabling better accessibility to educational resources and pedagogical scaffolds, wherever and whenever necessary. In this paper, we present EDU.Tube: an interactive environment that relies on web and mobile solutions offered to teachers and students for authoring and incorporating educational interactions at specific moments along the time line of occasional YouTube video-clips. The teachers and students could later experience these authored artefacts while interacting from their stationary or mobile devices. We describe our efforts related to the design, deployment and evaluation of an educational activity supported by the EDU.Tube environment. Furthermore, we illustrate the specific teachers’ and students’ efforts practiced along the different phases of this educational activity. The evaluation of this activity and results are presented, followed by a discussion of these findings, as well as some recommendations for future research efforts further elaborating on EDU.Tube’s aspects in relation to learning analytics.
The term “Cloud Computing” does not primarily specify new types of core technologies but rather addresses features to do with integration, interoperability and accessibility. Although not new, virtualization and automation are core features that characterize Cloud Computing. In this paper, we intend to explore the possibility of integrating cloud services with educational scenarios without re-defining neither the technology nor the usage scenarios from scratch. Our suggestion is based on certain solutions that have already been implemented and tested for specific cases.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.
This paper deals with the question how to integrate smart devices in Java appli-
cations. It will outline how different smart devices can be used to enrich learning
environments, we will point to some of the problems one has to face while dealing
with smart devices, a differentiation of smart devices will be done and we will give an
overview about existing Java Virtual Machines available for different smart devices.
Furthermore we will tackle the question of the communication between different smart
devices and also between different kinds of smart devices. An outlook to the future
work will also be given at the end of this work
One of the most stressing challenges in our culture is the demographic change. On the one hand, people become older and older, at the same time less young people are available in order to support the elderly. Currently, this fact already provides a number of social impacts that need to be solved in the near future. This paper concentrates on the integration of mobile devices in scenarios that allow elderly people to age successfully. Here, the term "aging successfully" refers to broad range of aspects from health to social life of elderly people. A special focus of this paper lies in the question whether services deployed to a mobile device provide advantages in the area of aging successfully. In order to answer this question, both technical challenges are explained and solved by example architectures, and scenarios that benefit from services deployed to mobile devices are explained.