Skip to main content
List of Publications of Marc Conrad
Research Interests:
Link to Marc Conrad's Plublications
Research Interests:
The study focuses on the relationship users of virtual worlds, such as Second Life, may or may not develop towards the avatar they use. A questionnaire was developed to collect both qualitative and quantitative data from students engaged... more
The study focuses on the relationship users of virtual worlds, such as Second Life, may or may not develop towards the avatar they use. A questionnaire was developed to collect both qualitative and quantitative data from students engaged in a university assignment that required them to use an avatar in Second Life. The findings are contextualized and discussed: The distinction
Surprisingly, Ennola [5] gave for n = 105 a relation that is not generated by the obvious relations. In the following we will call such a relation an Ennola relation. Schmidt investigated in [8] the gap between the obvious relations and... more
Surprisingly, Ennola [5] gave for n = 105 a relation that is not generated by the obvious relations. In the following we will call such a relation an Ennola relation. Schmidt investigated in [8] the gap between the obvious relations and all relations. He connected this gap to ...
ABSTRACT Short descriptions of computer algebra systems are presented in three sections: major systems, special purpose systems, and packages. However, the separation between special purpose systems and packages is not to be taken too... more
ABSTRACT Short descriptions of computer algebra systems are presented in three sections: major systems, special purpose systems, and packages. However, the separation between special purpose systems and packages is not to be taken too literally. An older survey is the paper by Calmet and van Hulzen in [Buchberger et al. 1982]. There is now an excellent new book by Wester [Wester 1999] that covers computer algebra systems.
ABSTRACT
Research Interests:
There are high expectations on Second Life, a multi-user interactive virtual environment, to play a prominent role in higher education in the future. Across universities worldwide many projects aim to engage students in a variety of... more
There are high expectations on Second Life, a multi-user interactive virtual environment, to play a prominent role in higher education in the future. Across universities worldwide many projects aim to engage students in a variety of activities related to Second Life. However typically the number of students participating in those projects is small and the use of Second Life is
We describe objects and methods for an object oriented concept of elliptic curves. In order to achieve this, the representation of elliptic curves in the computer algebra systems LiDIA and SIMATH is analyzed. This leads to the objects... more
We describe objects and methods for an object oriented concept of elliptic curves. In order to achieve this, the representation of elliptic curves in the computer algebra systems LiDIA and SIMATH is analyzed. This leads to the objects models (objects which realize ...
... Point (saving the PowerPoint slide as png-file, up-loading the file and applying the texture to a ... Even students without an ap-titude towards virtual worlds or “computer games” developed a sense of ... in view of ongoing research... more
... Point (saving the PowerPoint slide as png-file, up-loading the file and applying the texture to a ... Even students without an ap-titude towards virtual worlds or “computer games” developed a sense of ... in view of ongoing research in this area, to name only the SLOODLE (Kemp and ...
ABSTRACT A variety of visual passwords approaches were proposed that aim to replace conventional text passwords. The main advantage of both systems is that unlike biometrics and tokens they do not require special hardware. However they... more
ABSTRACT A variety of visual passwords approaches were proposed that aim to replace conventional text passwords. The main advantage of both systems is that unlike biometrics and tokens they do not require special hardware. However they still fail to provide a satisfying solution to the usability problems of today’s authentication systems. Both text and visual passwords have limitations. We show how those limitations can be minimized by combining the two systems together to provide an integrated login mechanism suitable for web applications. The design is user friendly and makes use of the human factor to enhance security and usability. Due to the hybrid nature of our approach, it includes an anti-phishing technique.