Author of the publication

A Robust and Non-invasive Strategy for Preserving Academic Integrity in an Open and Distance Learning Environment.

, , , and . ICALT, page 530-532. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The quest for a better tailoring of gameful design: An analysis of player type preferences., , , , , and . Interacción, page 1:1-1:8. ACM, (2019)FRAGGLE: A FRamework for AGile Gamification of Learning Experiences., , , and . GALA, volume 9599 of Lecture Notes in Computer Science, page 530-539. Springer, (2015)Collaborative group membership and access control for JXTA., and . COMSWARE, page 159-166. IEEE, (2008)A Study on Practices against Malware in Free Software Projects., , and . AINA Workshops, page 1070-1075. IEEE Computer Society, (2013)An Anonymity Layer for JXTA Services., and . AINA Workshops, page 102-107. IEEE Computer Society, (2011)JXTA-Overlay P2P Platform and Its Application for Robot Control., , , , , and . NBiS, page 133-138. IEEE Computer Society, (2010)Effect of personalized gameful design on student engagement., , , and . EDUCON, page 1925-1933. IEEE, (2018)VoIP: making secure calls and maintaining high call quality., , , , and . MoMM, page 56-62. ACM, (2010)An Integrated Structure for a Virtual Networking Laboratory., , and . IEEE Trans. Ind. Electron., 55 (6): 2334-2342 (2008)JXTAnonym: An Anonymity Layer for JXTA Services Messaging., and . IEICE Trans. Inf. Syst., 95-D (1): 169-176 (2012)