决定性 发表于 2025-3-26 21:00:58

http://reply.papertrans.cn/32/3108/310746/310746_31.png

jettison 发表于 2025-3-27 03:03:15

,Biometric Tools for Learner Identity in e-Assessment,enetics and vital experience. Although there are many traits that can be used to verify the identity of a learner, such as the voice, appearance, fingerprints, iris, or gait among others, most of them require the use of special sensors. This chapter presents an analysis of four biometric tools based

性学院 发表于 2025-3-27 07:18:20

Engineering Cloud-Based Technological Infrastructure,utions into a cloud platform. This is mainly because of the evident benefits of using cloud-based solutions like high availability, scalability or redundancy, which are impossible or too much costly to be achieved on-premises. Cloud platforms may reduce considerably the costs and difficulty of maint

Minutes 发表于 2025-3-27 09:51:27

Security and Privacy in the TeSLA Architecture,, we outline the main concepts underlying security in TeSLA, with regards to the protection of learners’ data and the architecture itself. Secondly, we provide an empirical analysis of a specific deployment in one of the members of the consortium. Some representative aspects such as security levels

babble 发表于 2025-3-27 15:30:41

http://reply.papertrans.cn/32/3108/310746/310746_35.png

ear-canal 发表于 2025-3-27 21:14:46

http://reply.papertrans.cn/32/3108/310746/310746_36.png

使尴尬 发表于 2025-3-28 00:58:51

http://reply.papertrans.cn/32/3108/310746/310746_37.png

不理会 发表于 2025-3-28 03:04:21

Integration of TeSLA in Assessment Activities,ssessment activities in authentic courses. A thematic analysis of these case studies identified seven common categories of TeSLA instrument use, which varied according to the design of the assessment activity and the teacher’s purpose in seeking to authenticate student identity and/or check the auth

Perigee 发表于 2025-3-28 08:51:50

http://reply.papertrans.cn/32/3108/310746/310746_39.png

engrossed 发表于 2025-3-28 11:22:34

An Evaluation Methodology Applied to Trust-Based Adapted Systems for e-Assessment: Connecting Respooduced to check student authentication and authorship. This methodology was underpinned by a Responsible Research and Innovation approach combined with human-centred design. Participants were 4058 students, which included 330 with special needs, together with 54 teaching staff and 21 institutional m
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Engineering Data-Driven Adaptive Trust-based e-Assessment Systems; Challenges and Infra David Baneres,M. Elena Rodríguez,Ana Elena Guerrer