NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Brady, Corey; Orton, Kai; Weintrop, David; Anton, Gabriella; Rodriguez, Sebastian; Wilensky, Uri – IEEE Transactions on Education, 2017
Computer science (CS) is becoming an increasingly diverse domain. This paper reports on an initiative designed to introduce underrepresented populations to computing using an eclectic, multifaceted approach. As part of a yearlong computing course, students engage in Maker activities, participatory simulations, and computing projects that…
Descriptors: Simulation, Technology Uses in Education, Educational Technology, Student Projects
Stonebraker, Michael; Neuhold, Eric – 1976
Extensions are required to the currently operational INGRES data base system for it to manage a data base distributed over multiple machines in a computer network running the UNIX operating system. Three possible user views include: (1) each relation in a unique machine, (2) a user interaction with the data base which can only span relations at a…
Descriptors: Computer Science, Computers, Databases, Information Retrieval
Pradels, Jean Louis – 1973
Rooted binary trees with weighted nodes are structures encountered in many areas, such as coding theory, searching and sorting, information storage and retrieval. The path length is a meaningful quantity which gives indications about the expected time of a search or the length of a code, for example. In this paper, two sharp bounds for the total…
Descriptors: Codification, Computer Science, Information Retrieval, Information Science
Hsiao, D. K.; And Others – 1974
Although the indispensibility of access control mechanisms in data secure systems has been recognized, there is a need for more subtle protection and refined control mechanisms. This report describes context protection mechanisms which enable the same data unit to be protected differently in different contexts, the differences being determined by…
Descriptors: Computer Programs, Computer Science, Confidentiality, Data Processing
Yu, Clement T. – 1973
The computational complexity of a formal process for the construction of term classes for information retrieval is examined. While the process is proven to be difficult computationally, heuristic methods are applied. Experimental results are obtained to illustrate the maximum possible improvement in system performance of retrieval using the formal…
Descriptors: Computer Programs, Computer Science, Computers, Databases
Ohio State Univ., Columbus. Computer and Information Science Research Center. – 1975
Abstracts of research papers in computer and information science are given for 68 papers in the areas of information storage and retrieval; human information processing; information analysis; linguistic analysis; artificial intelligence; information processes in physical, biological, and social systems; mathematical techniques; systems…
Descriptors: Abstracts, Annual Reports, Artificial Intelligence, Cognitive Processes
Herrenkohl, Roy C. – 1975
Presented is a report on the computerized record keeping, service accounting, and evaluation system developed for the Lehigh Valley Association for Retarded Citizens (LARC). Described is the purpose of the LARC system, its current status, its development, and a variety of activities associated with its use. The introduction (Part I) provides…
Descriptors: Community Services, Computer Science, Delivery Systems, Exceptional Child Services
Salton, Gerard – 1974
The twenty-second in a series, this report describes research in information organization and retrieval conducted by the Department of Computer Science at Cornell University. The report covers work carried out during the period summer 1972 through summer 1974 and is divided into four parts: indexing theory, automatic content analysis, feedback…
Descriptors: Algorithms, Computer Programs, Computer Science, Content Analysis
Karweit, Nancy – 1976
This project report describes the process used to convert the retrospective life history data collected in 1969 at the Center for Social Organization of Schools at the Johns Hopkins University to a more usable form, the writing and testing of computer storage and retrieval programs for the data, and the initial interpretation of data relating to…
Descriptors: Adult Education, Biographical Inventories, Computer Programs, Computer Science