Author of the publication

Integration of Game Elements with Role Play in Collaborative Learning - A Case Study of Quasi-GBL in Chinese Higher Education.

, and . Edutainment, volume 5093 of Lecture Notes in Computer Science, page 427-435. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method and System of Maize Hybridized Combination Based on Inbred SSR and Field Test., , , , , and . CCTA (1), volume 478 of IFIP Advances in Information and Communication Technology, page 446-458. (2015)Why Do Students Engage in e-Learning: A Chinese Perspective., and . ICCE, volume 151 of Frontiers in Artificial Intelligence and Applications, page 379-382. IOS Press, (2006)Edge-assisted and energy-efficient access control for dynamic users group in smart grids., , , and . Peer Peer Netw. Appl., 17 (3): 1149-1157 (May 2024)Intelligent Advanced Attack Detection Technology based on Multi-modal Data Fusion., , , and . Scalable Comput. Pract. Exp., 25 (4): 2581-2588 (2024)Verification and Optimization of Network Security Defense System from the Perspective of Blue Army in Actual Offensive and Defensive Exercises., , and . Scalable Comput. Pract. Exp., 25 (4): 2596-2602 (2024)Improving Quality of Online Forum Interactions in Distance Higher Education., and . ICCE, volume 151 of Frontiers in Artificial Intelligence and Applications, page 645-646. IOS Press, (2006)Network security analysis for cloud computing environment., , , , and . Int. J. Model. Simul. Sci. Comput., 13 (6): 2250054:1-2250054:20 (December 2022)A Phenomenographic Study into Conceptions of Social Relations in Online Collaborative Learning - Case Study of China Higher Education Learners., and . CSSE (5), page 146-149. IEEE Computer Society, (2008)978-0-7695-3336-0.Construction of Power System Network Security Defense Behavior Decision-making Model based on Artificial Intelligence Technology., , , and . Scalable Comput. Pract. Exp., 25 (4): 2614-2620 (2024)Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology., , , and . Scalable Comput. Pract. Exp., 25 (5): 3491-3499 (2024)