Hal Abelson

Results: 23



#Item
11center for MOBILE LEARNING Mission

center for MOBILE LEARNING Mission

Add to Reading List

Source URL: mitmobilelearning.org

Language: English - Date: 2011-11-10 08:54:54
12ccREL: The Creative Commons Rights Expression Language Hal Abelson, Ben Adida, Mike Linksvayer, Nathan Yergler [hal,ben,ml,nathan]@creativecommons.org Version 1.0 – March 3rd, [removed]

ccREL: The Creative Commons Rights Expression Language Hal Abelson, Ben Adida, Mike Linksvayer, Nathan Yergler [hal,ben,ml,nathan]@creativecommons.org Version 1.0 – March 3rd, [removed]

Add to Reading List

Source URL: wiki.creativecommons.org

Language: English - Date: 2009-07-29 14:29:49
13Can Android App Inventor Bring Computational Thinking to K-12? Ralph Morelli Trishan de Lanerolle

Can Android App Inventor Bring Computational Thinking to K-12? Ralph Morelli Trishan de Lanerolle

Add to Reading List

Source URL: www.hfoss.org

Language: English - Date: 2012-04-14 09:25:06
14  MASSACHUSETTS INSTITUTE OF TECHNOLOGY July 30, 2013  L. Rafael Reif, President

  MASSACHUSETTS INSTITUTE OF TECHNOLOGY July 30, 2013 L. Rafael Reif, President

Add to Reading List

Source URL: swartz-report.mit.edu

Language: English - Date: 2013-07-29 17:18:04
15Access Control is an Inadequate Framework for Privacy Protection Lalana Kagal and Hal Abelson MIT Computer Science and Artificial Intelligence Lab 32 Vassar Street Cambridge MA 02139 {lkagal, hal}@csail.mit.edu

Access Control is an Inadequate Framework for Privacy Protection Lalana Kagal and Hal Abelson MIT Computer Science and Artificial Intelligence Lab 32 Vassar Street Cambridge MA 02139 {lkagal, hal}@csail.mit.edu

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2010-06-19 07:42:37
16

PDF Document

Add to Reading List

Source URL: sciencecommons.org

Language: English - Date: 2008-07-23 14:18:04
17Seductive myths about privacy • Myth: The major privacy risk is from unauthorized access to information • Myth: Privacy can be adequately protected by removing personally identifying information (PII) from records to

Seductive myths about privacy • Myth: The major privacy risk is from unauthorized access to information • Myth: Privacy can be adequately protected by removing personally identifying information (PII) from records to

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:39:21
18Massachusetts Institute of Technology Vol. XXVI No. 1 September/October 2013

Massachusetts Institute of Technology Vol. XXVI No. 1 September/October 2013

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2013-09-19 08:13:33
19MIT Faculty Newsletter, Vol. XXIV No. 2, November/December 2011

MIT Faculty Newsletter, Vol. XXIV No. 2, November/December 2011

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-12-06 14:22:56
20MIT Faculty Newsletter, Vol. XXIII No. 5, May/June 2011

MIT Faculty Newsletter, Vol. XXIII No. 5, May/June 2011

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-06-01 14:53:07