Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
IEEE Transactions on Education | 9 |
Author
Barlowe, Scott | 1 |
Ciuffoletti, Augusto | 1 |
Copeland, J. A. | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Fairbanks, K. D. | 1 |
Hamblen, J. O. | 1 |
Huang, Dijiang | 1 |
Lee, C. P. | 1 |
Marquez Hernandez, F. A. | 1 |
Mateo Sanguino, T. J. | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 5 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Education Level
Higher Education | 8 |
Postsecondary Education | 5 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Barlowe, Scott – IEEE Transactions on Education, 2021
Contribution: This article demonstrates that social, cultural, economic, and political topics can be effectively addressed in the context of traditional computer science and engineering topics with few additional resources and little coordination. Background: Social, cultural, economic, and political influences are often secondary topics in…
Descriptors: Global Approach, Computer Science Education, Computer Networks, Social Influences
Ciuffoletti, Augusto – IEEE Transactions on Education, 2021
Contribution: A technical course in a multidisciplinary university program has to provide high-level skills, with limited lecturing hours and student background. This article investigates the principles for its design and reports about a study case. Background: The overall course organization needs to address specific learning targets and teaching…
Descriptors: Curriculum Design, Course Organization, Computer Networks, Course Evaluation
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Hamblen, J. O.; van Bekkum, G. M. E. – IEEE Transactions on Education, 2013
This paper describes a new approach for a course and laboratory designed to allow students to develop low-cost prototypes of robotic and other embedded devices that feature Internet connectivity, I/O, networking, a real-time operating system (RTOS), and object-oriented C/C++. The application programming interface (API) libraries provided permit…
Descriptors: Robotics, Engineering Education, Computer Science Education, Internet
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Mateo Sanguino, T. J.; Serrano Lopez, C.; Marquez Hernandez, F. A. – IEEE Transactions on Education, 2013
A new educational simulation tool designed for the generic study of wireless networks, the Wireless Fidelity Simulator (WiFiSim), is presented in this paper. The goal of this work was to create and implement a didactic tool to improve the teaching and learning of computer networks by means of two complementary strategies: simulating the behavior…
Descriptors: Computer Simulation, Telecommunications, Information Networks, Computer Science Education
Ttofis, C.; Theocharides, T.; Michael, M. K. – IEEE Transactions on Education, 2012
Manycore systems have emerged as being one of the dominant architectural trends in next-generation computer systems. These highly parallel systems are expected to be interconnected via packet-based networks-on-chip (NoC). The complexity of such systems poses novel and exciting challenges in academia, as teaching their design requires the students…
Descriptors: Computer System Design, Computer Networks, Computer Science Education, Teaching Methods
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education