From post

A meta systematic review of artificial intelligence in higher education: a call for increased ethics, collaboration, and rigour

, , , , , , , , и . International Journal of Educational Technology in Higher Education, (января 2024)
DOI: 10.1186/s41239-023-00436-z

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

k-Submodular Cover Problem: Application and Algorithms., , , , , и . SoICT, стр. 442-449. ACM, (2022)Predicting Learners' Emotions in Mobile MOOC Learning via a Multimodal Intelligent Tutor., и . ITS, том 10858 из Lecture Notes in Computer Science, стр. 150-159. Springer, (2018)AttentiveLearner2: A Multimodal Approach for Improving MOOC Learning on Mobile Devices., и . AIED, том 10331 из Lecture Notes in Computer Science, стр. 561-564. Springer, (2017)Activation-induced cytidine deaminase deaminates deoxycytidine on single-stranded DNA but requires the action of RNase, , , и . Proceedings of the National Academy of Sciences, 100 (7): 4102-4107 (2003)Adaptive Review for Mobile MOOC Learning via Multimodal Physiological Signal Sensing - A Longitudinal Study, и . Proceedings of the 2018 on International Conference on Multimodal Interaction - ICMI \textquotesingle18, стр. 63-72. ACM Press, (2018)A meta systematic review of artificial intelligence in higher education: a call for increased ethics, collaboration, and rigour, , , , , , , , и . International Journal of Educational Technology in Higher Education, (января 2024)AttentiveVideo: A Multimodal Approach to Quantify Emotional Responses to Mobile Advertisements., и . ACM Trans. Interact. Intell. Syst., 9 (2-3): 8:1-8:30 (2019)NLPReViz: an interactive tool for natural language processing on clinical text., , , , , и . J. Am. Medical Informatics Assoc., 25 (1): 81-87 (2018)Rebound Attacks on SKINNY Hashing with Automatic Tools., , , и . IACR Cryptol. ePrint Arch., (2022)Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory., , , и . ASIACRYPT (3), том 14440 из Lecture Notes in Computer Science, стр. 3-33. Springer, (2023)