Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 7 |
Descriptor
Identification | 7 |
Programming | 7 |
Case Studies | 2 |
Computer Software | 2 |
Decision Making | 2 |
Elementary Schools | 2 |
Evaluation | 2 |
Middle Schools | 2 |
Models | 2 |
Authors | 1 |
Automation | 1 |
More ▼ |
Source
ProQuest LLC | 7 |
Author
Agada, Ruth O. | 1 |
Banks, Edward J. | 1 |
Brown, Robert L. | 1 |
Rives, Ann Guidry | 1 |
Tennyson, Matthew F. | 1 |
Watkins, Charlette Ward | 1 |
Yahav, Inbal | 1 |
Publication Type
Dissertations/Theses -… | 7 |
Education Level
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Middle Schools | 2 |
Adult Education | 1 |
High Schools | 1 |
Audience
Location
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brown, Robert L. – ProQuest LLC, 2014
A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…
Descriptors: Computer Security, Identification, Automation, Programming
Agada, Ruth O. – ProQuest LLC, 2016
Recognition of spontaneous emotion would influence human-computer interaction and emotion-related studies in many related fields. In any given environment, the spontaneous generation of expression are more often observed than their prototypic counterparts.This thesis explores methods for detecting emotional facial expressions occurring in a…
Descriptors: Intelligent Tutoring Systems, Comprehension, Nonverbal Communication, Identification
Tennyson, Matthew F. – ProQuest LLC, 2013
Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…
Descriptors: Authors, Programming, Computer Software, Plagiarism
Watkins, Charlette Ward – ProQuest LLC, 2009
Aspect-Oriented Software Development (AOSD) is a new approach that addresses limitations inherent in conventional programming, especially the principle of separation of concerns by emphasizing the encapsulation and modularization of crosscutting concerns through a new abstraction, the "aspect." Aspect-oriented programming is an emerging AOSD…
Descriptors: Check Lists, Programming Languages, Identification, Computer Software
Banks, Edward J. – ProQuest LLC, 2011
If it is true that bullying begins in elementary school and peaks in middle school, schools are obvious laboratories of research, undeniable arenas of investigation. With a reality of physical, social, and emotional undoing, and a result of serious short and long term repercussions, this phenomenon not only affects the social environments, but the…
Descriptors: Expertise, Prevention, Programming, Intervention
Rives, Ann Guidry – ProQuest LLC, 2009
The importance of school counselors in influencing positive change in students is well established. Far less research is available documenting school counselor use of data driven decision making to positively impact identified groups of at risk students. Hispanics represent the largest and fastest growing student population for academic…
Descriptors: Social Justice, Underachievement, Standardized Tests, Social Change
Yahav, Inbal – ProQuest LLC, 2010
In this dissertation we develop a framework that combines data mining, statistics and operations research methods for improving real-time decision support systems in healthcare. Our approach consists of three main concepts: data gathering and preprocessing, modeling, and deployment. We introduce the notion of offline and semi-offline modeling to…
Descriptors: Operations Research, Research Methodology, Identification, Programming