Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
IEEE Transactions on Education | 2 |
ACM Transactions on Computing… | 1 |
Journal of Educational… | 1 |
Journal of Information… | 1 |
Author
Copeland, J. A. | 1 |
Ebrahimi, Alireza | 1 |
Esmaeildoust, M. | 1 |
Fairbanks, K. D. | 1 |
King, Michael A. | 1 |
Lee, C. P. | 1 |
Molahosseini, A. S. | 1 |
Navi, K. | 1 |
Tenenberg, Josh | 1 |
Uluagac, A. S. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Evaluative | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Audience
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tenenberg, Josh – ACM Transactions on Computing Education, 2014
Asking significant research questions is a crucial aspect of building a research foundation in computer science (CS) education. In this article, I argue that the questions that we ask are shaped by internalized theoretical presuppositions about how the social and behavioral worlds operate. And although such presuppositions are essential in making…
Descriptors: Research Methodology, Questioning Techniques, Computer Science Education, Research Projects
Navi, K.; Molahosseini, A. S.; Esmaeildoust, M. – IEEE Transactions on Education, 2011
The residue number system (RNS) has been an important research field in computer arithmetic for many decades, mainly because of its carry-free nature, which can provide high-performance computing architectures with superior delay specifications. Recently, research on RNS has found new directions that have resulted in the introduction of efficient…
Descriptors: Number Systems, Teaching Methods, Computer System Design, Computer Science Education
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Ebrahimi, Alireza – Journal of Educational Technology Systems, 2012
How does early feedback change the programming problem solving in an online environment and help students choose correct approaches? This study was conducted in a sample of students learning programming in an online course entitled Introduction to C++ and OOP (Object Oriented Programming) using the ANGEL learning management system platform. My…
Descriptors: Programming, Computer Science Education, Online Courses, Computer Mediated Communication
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics