Refine
Year of publication
Document Type
- Article (51) (remove)
Keywords
- Security (3)
- e-learning (3)
- Digitale Bildung (2)
- Energy (2)
- Kursdesign (2)
- MOOC (2)
- Micro Degree (2)
- Online-Lehre (2)
- Onlinekurs (2)
- Onlinekurs-Produktion (2)
- Privacy (2)
- course design (2)
- digital education (2)
- framework (2)
- micro degree (2)
- micro-credential (2)
- online course creation (2)
- online course design (2)
- online teaching (2)
- Anomaly detection (1)
- Approximation algorithms (1)
- Architectures (1)
- Attribute aggregation (1)
- Authentication (1)
- Automated parsing (1)
- Big Five model (1)
- Blockchains (1)
- Computer-assisted instruction (1)
- Confusion matrix (1)
- Correlation (1)
- Cross-modal retrieval (1)
- Data breach (1)
- Data models (1)
- Deep learning (1)
- Deep neural networks (1)
- Denial of sleep (1)
- Disadvantaged communities (1)
- Distributed snapshot algorithm (1)
- E-health (1)
- Electrical products (1)
- Electronic prescription (1)
- Energy-aware (1)
- Event normalization (1)
- Event processing (1)
- Feedback control loop (1)
- Forecasting (1)
- Fuzzy logic (1)
- Grid stability (1)
- HITS (1)
- HMM (1)
- Home appliances (1)
- ICT (1)
- IDS (1)
- IDS management (1)
- Identity leak (1)
- Identity management systems (1)
- Imbalanced medical image semantic segmentation (1)
- In-memory (1)
- Incubator (1)
- Internet of things (1)
- Interviews (1)
- Intrusion detection (1)
- Inventory systems (1)
- Java (1)
- LSTM (1)
- Licenses (1)
- Link layer security (1)
- Load modeling (1)
- Lossy networks (1)
- Low-processing capable devices (1)
- MAC security (1)
- MOOCs (1)
- Machine learning (1)
- Massive Open Online Course (MOOC) (1)
- Micro-grid networks (1)
- Monitoring (1)
- Multimodal representation (1)
- Network graph (1)
- Network monitoring (1)
- Network topology (1)
- Orchestration (1)
- Outlier detection (1)
- Parallel processing (1)
- Power consumption characterization (1)
- Power demand (1)
- Prediction (1)
- Preterm (1)
- Programming (1)
- Protocols (1)
- Recurrent generative (1)
- Remote patient monitoring (1)
- Resource constrained smart micro-grids (1)
- Resource description framework (1)
- Resource management (1)
- Robust optimization (1)
- SAP HANA (1)
- Semantic feature (1)
- Sensor networks (1)
- Service detection (1)
- Smart micro-grids (1)
- Software (1)
- Technology enhanced learning (1)
- Virtualization (1)
- Wireless sensor networks (1)
- abdominal imaging (1)
- accuracy (1)
- adversarial network (1)
- argumentation research (1)
- assignments (1)
- attack graph (1)
- attribute assurance (1)
- brand personality (1)
- cloud security (1)
- cognition (1)
- collaboration (1)
- collaborative learning (1)
- collaborative tagging (1)
- content gamification (1)
- creativity (1)
- cyber humanistic (1)
- design thinking (1)
- developing countries (1)
- digital identity (1)
- eLectures (1)
- education (1)
- expertise (1)
- flexibility (1)
- folksonomy (1)
- gameful learning (1)
- generative multi-discriminative networks (1)
- healthcare (1)
- identity broker (1)
- image captioning (1)
- imbalanced learning (1)
- innovation (1)
- knowledge building (1)
- knowledge management (1)
- learner engagement (1)
- learning (1)
- learning path (1)
- machine (1)
- measurement (1)
- medical identity theft (1)
- memory-based clustering (1)
- memory-based correlation (1)
- memory-based databases (1)
- metacognition (1)
- modularization (1)
- multi-core (1)
- multimodal representations (1)
- mutli-task learning (1)
- narrative (1)
- one-time password (1)
- personality prediction (1)
- phishing (1)
- programming (1)
- ranking (1)
- resilient architectures (1)
- security chaos engineering (1)
- security risk assessment (1)
- segmentation (1)
- self-paced learning (1)
- self-sovereign identity (1)
- semantic (1)
- social media analysis (1)
- spamming (1)
- steganography (1)
- storytelling (1)
- teamwork (1)
- tele-teaching (1)
- trust model (1)
- video annotation (1)
- virtual groups (1)