Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Coding | 3 |
Federal Programs | 3 |
Algorithms | 1 |
Civil Liberties | 1 |
Communicative Competence… | 1 |
Computer Networks | 1 |
Computer Software | 1 |
Early Childhood Education | 1 |
Early Intervention | 1 |
English | 1 |
Ethics | 1 |
More ▼ |
Author
Aller, T. B. | 1 |
Anderson, S. | 1 |
Diamond, Ted | 1 |
Piercy, K. W. | 1 |
Roggman, L. A. | 1 |
Tasseva-Kurktchieva, Mila | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Education Level
Early Childhood Education | 1 |
Audience
Location
Bulgaria | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Anderson, S.; Aller, T. B.; Piercy, K. W.; Roggman, L. A. – Early Child Development and Care, 2015
Early childhood programmes (ECPs) serving children from low-income families are becoming increasingly interested in engaging fathers. The purpose of this study was to examine perspectives of diverse fathers with low incomes to more fully understand how their experiences within an ECP influenced father-role construction and facilitated their…
Descriptors: Early Childhood Education, Father Attitudes, Fathers, Parent Role
Tasseva-Kurktchieva, Mila – Second Language Research, 2015
So far, the comprehension and production language modes have typically been studied separately in generative second language acquisition research, with the focus shifting from one to the other. This article revisits the asymmetric relationship between comprehension and production by examining the second language (L2) acquisition of the noun phrase…
Descriptors: Second Language Learning, Language Research, Semantics, Slavic Languages

Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks