Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Coding | 3 |
| Federal Programs | 3 |
| Algorithms | 1 |
| Civil Liberties | 1 |
| Communicative Competence… | 1 |
| Computer Networks | 1 |
| Computer Software | 1 |
| Early Childhood Education | 1 |
| Early Intervention | 1 |
| English | 1 |
| Ethics | 1 |
| More ▼ | |
Author
| Aller, T. B. | 1 |
| Anderson, S. | 1 |
| Diamond, Ted | 1 |
| Piercy, K. W. | 1 |
| Roggman, L. A. | 1 |
| Tasseva-Kurktchieva, Mila | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Opinion Papers | 1 |
| Reports - Descriptive | 1 |
Education Level
| Early Childhood Education | 1 |
Audience
Location
| Bulgaria | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Anderson, S.; Aller, T. B.; Piercy, K. W.; Roggman, L. A. – Early Child Development and Care, 2015
Early childhood programmes (ECPs) serving children from low-income families are becoming increasingly interested in engaging fathers. The purpose of this study was to examine perspectives of diverse fathers with low incomes to more fully understand how their experiences within an ECP influenced father-role construction and facilitated their…
Descriptors: Early Childhood Education, Father Attitudes, Fathers, Parent Role
Tasseva-Kurktchieva, Mila – Second Language Research, 2015
So far, the comprehension and production language modes have typically been studied separately in generative second language acquisition research, with the focus shifting from one to the other. This article revisits the asymmetric relationship between comprehension and production by examining the second language (L2) acquisition of the noun phrase…
Descriptors: Second Language Learning, Language Research, Semantics, Slavic Languages
Peer reviewedDiamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks

Direct link
