NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C. – IEEE Transactions on Education, 2016
This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…
Descriptors: Teaching Methods, Information Security, Information Networks, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Dietze, Stefan; Gugliotta, Alessio; Domingue, John – International Journal of Distance Education Technologies, 2009
Current E-Learning technologies primarily follow a data and metadata-centric paradigm by providing the learner with composite content containing the learning resources and the learning process description, usually based on specific metadata standards such as ADL SCORM or IMS Learning Design. Due to the design-time binding of learning resources,…
Descriptors: Electronic Learning, Learning Processes, Educational Technology, Metadata
Weiss, Andrew M. – MultiMedia Schools, 1996
Running multimedia on a network, often difficult because of the memory and processing power required, is becoming easier thanks to new protocols and products. Those developing network design criteria may wish to consider making use of Fast Ethernet, Asynchronous Transfer Method (ATM), switches, "fat pipes", additional network…
Descriptors: Computer Networks, Computer System Design, Computer Uses in Education, Design Preferences
Peer reviewed Peer reviewed
Direct linkDirect link
Retalis, Symeon; Georgiakakis, Petros; Dimitriadis, Yannis – Computer Science Education, 2006
Design pattern creation, especially in the e-learning domain, is a highly complex process that has not been sufficiently studied and formalized. In this paper, we propose a systematic pattern development cycle, whose most important aspects focus on reverse engineering of existing systems in order to elicit features that are cross-validated through…
Descriptors: Validated Programs, Instructional Design, Courseware, Electronic Learning
Vishik, Claire; Farquhar, Adam; Smith, Reid – Proceedings of the ASIS Annual Meeting, 1999
Discusses experiences of Schlumberger IT Sourcing (Austin, Texas) in designing and deploying knowledge management (KM) systems and outlines the empathic design approach. The new "market" approach in Schlumberger which leads to the simplification of intranet systems and interfaces, creation of a new classification system, and better…
Descriptors: Computer Interfaces, Computer Networks, Computer System Design, Design Preferences
Detlor, Brian – Proceedings of the ASIS Annual Meeting, 1998
Proposes a user-centered framework for intranet design based on an understanding of people, their typical problems, information behaviors, and situated contexts. Argues that by adopting such an approach, intranets can be designed which facilitate organizational information access and use. (Author/AEF)
Descriptors: Access to Information, Computer Networks, Computer System Design, Design Preferences