Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Algorithms | 2 |
Training Methods | 2 |
Artificial Intelligence | 1 |
Behavior Patterns | 1 |
Computation | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
Computer Software | 1 |
Correlation | 1 |
Educational Improvement | 1 |
Efficiency | 1 |
More ▼ |
Author
Chuan Xiao | 1 |
Huizhong Liu | 1 |
Jakub Rudolf Mlynárik | 1 |
Karolína Dockalová Burská | 1 |
Radek Ošlejšek | 1 |
Zengqing Wu | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zengqing Wu; Huizhong Liu; Chuan Xiao – IEEE Transactions on Education, 2024
Contribution: This research illuminates information entropy's efficacy as a pivotal educational tool in programming, enabling the precise quantification of algorithmic complexity and student abstraction levels for solving problems. This approach can provide students quantitative, comparative insights into the differences between optimal and…
Descriptors: Information Theory, Student Evaluation, Thinking Skills, Algorithms
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods