The thin glass line: designing interfaces to algorithms
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Formal description and evaluation of user-adapted interfaces
International Journal of Human-Computer Studies
Using encryption for authentication in large networks of computers
Communications of the ACM
Software Visualization
Algorithm visualization using concept keyboards
SoftVis '05 Proceedings of the 2005 ACM symposium on Software visualization
Proceedings of the 27th international conference on Software engineering
Algorithm Explanation Using Multimodal Interfaces
SCCC '05 Proceedings of the XXV International Conference on The Chilean Computer Science Society
Novel algorithm explanation techniques for improving algorithm teaching
SoftVis '06 Proceedings of the 2006 ACM symposium on Software visualization
Visual language implementation through standard compiler-compiler techniques
Journal of Visual Languages and Computing
Visualization of cryptographic protocols with GRACE
Journal of Visual Languages and Computing
Concept keyboards in the animation of standard algorithms
Journal of Visual Languages and Computing
Cooperative creation of concept keyboards in distributed learning environments
CSCWD '09 Proceedings of the 2009 13th International Conference on Computer Supported Cooperative Work in Design
Electronic Notes in Theoretical Computer Science (ENTCS)
Interface creation and redesign techniques in collaborative learning scenarios
Future Generation Computer Systems
Hi-index | 0.00 |
Cooperative work in learning environments has been shown to be a successful extension to traditional learning systems due to the great impact of cooperation on students' motivation and learning success. In this paper we describe a new approach to cooperative construction of cryptographic protocols. Using an appropriate visual language (VL), students describe a protocol step by step, modeling subsequent situations and alternating this with the creation of a concept keyboard (CK) describing the operations in the protocol. The system automatically generates a colored Petri subnet that is matched against an existing action logic specifying the protocol. Finally, the learners implement role-dependent CKs in a cooperative workflow and perform a role-play simulation.