Author of the publication

MISSED - Studying Students' Development of Misconceptions in Hybrid Courses.

, , and . ICHL, volume 8038 of Lecture Notes in Computer Science, page 364-376. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statiscal-based skin classifier for omni-directional images., , and . VISAPP (Special Sessions), page 11-17. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2007)Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance., and . ICDF2C, volume 31 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 139-150. Springer, (2009)Workshop on cybersecurity: security and privacy in the 21st century., , , and . CASCON, page 366. ACM, (2009)Detection of side-channel communication in ad hoc networks using request to send (RTS) messages., , , , , , and . CCECE, page 1-6. IEEE, (2014)Personalized-Adaptive Learning - A Model for CIT Curricula., , , , and . ICHL, volume 8595 of Lecture Notes in Computer Science, page 266-277. Springer, (2014)Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces., , , , and . AVR (2), volume 9769 of Lecture Notes in Computer Science, page 55-64. Springer, (2016)Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML., , , , , and . AINA Workshops (2), page 582-587. IEEE Computer Society, (2007)Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs., , and . ANT/SEIT, volume 83 of Procedia Computer Science, page 433-440. Elsevier, (2016)Crypto-assistant: Towards facilitating developer's encryption of sensitive data., , and . PST, page 342-346. IEEE Computer Society, (2014)System-Assigned Passwords You Can't Write Down, But Don't Need To., , and . PST, page 137-146. IEEE Computer Society, (2017)