Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Access to Information | 4 |
Programming | 3 |
Computer Science | 2 |
Computer System Design | 2 |
Electronic Mail | 2 |
Information Technology | 2 |
Web Sites | 2 |
Audio Equipment | 1 |
Barriers | 1 |
Classification | 1 |
Coding | 1 |
More ▼ |
Source
ProQuest LLC | 4 |
Publication Type
Dissertations/Theses -… | 4 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jorge J. Sanchez – ProQuest LLC, 2022
This dissertation is not a dissertation, at least not in the traditional white-normed academic standards. Let's call it a project. This project aims to capture the lived experiences of Latinos navigating a whitestream educational system while using Hip-Hop culture as a form of empowerment. Whitestream schooling is causing cultural genocide that…
Descriptors: Decolonization, Music, Popular Culture, Self Concept
Russell, Kyle – ProQuest LLC, 2014
While accessibility of information technologies is often acknowledged as important, it is frequently not well addressed in practice. The purpose of this study was to examine the work of web developers and content managers to explore why and how accessibility is or is not addressed as an objective as websites are planned, built and maintained.…
Descriptors: Computer System Design, Web Sites, Access to Information, Information Technology
Shen, Warren H. – ProQuest LLC, 2009
This dissertation studies information extraction (IE), the problem of extracting structured information from unstructured data. Example IE tasks include extracting person names from news articles, product information from e-commerce Web pages, street addresses from emails, and names of emerging music bands from blogs. IE is all increasingly…
Descriptors: Information Retrieval, Access to Information, Data Processing, Pattern Recognition
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis