منابع مشابه
Attestation: Proving Trustability
In the last few chapters we have looked at the first stages in a process toward establishing trust between systems. First, the establishment of roots of trust and the measured boot components; and second, the collection of evidence throughout the measurement process. We reviewed the different roots of trust in a compute platform—namely, the RTM, RTS, and RTR—and how the measured boot process (S...
متن کاملEvaluating E-Learning Systems Using E-Traceability Systems
Problem statement: Electronic learning (e-learning) System is an ideal example of these modern learning options. It provides reliable, convenient and easily accessible environment of learning. Since the e-learning is now growing in King Saud University, this new learning approach has to be evaluated and monitored to measure the efficiency and ultimately improves its productivity. The monitoring...
متن کاملModeling for E-Learning Systems
Computer-based instruction is touted as an effective tool to support knowledge dissemination within predefined learning environments. Indeed, many see it as a way to overcome geographical or social barriers to knowledge transmission and educational institutions. However, its domain of application has traditionally been restricted to basic skills and educational contexts. Recently, dynamic and c...
متن کاملAdaptivity In E-learning Systems
This paper aims to give a short review of adaptivity in e-learning systems and the work done in this field. The review is mainly focused on the different parameters we can use to make an e-learning system adaptive. Some adaptive e-learning systems are shortly described, highlighting the student characteristics the system adapts to. Deciding the parameter or parameters the system will adapt to, ...
متن کاملProfiled Search Methods for e-Learning Systems
Most currently used e-Learning Systems do not often offer search functionality. Even if methods are provided to search for Learning Objects (LOs), they don’t usually utilize information about users’ interests stored in their profiles. Moreover, most of the search engines are only use query conformity to order the result list. User profiling methods are usually absent, as behaviour analysis meth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/ijca2015907095