NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Dragon, Toby – ProQuest LLC, 2013
This thesis explores the design and evaluation of a collaborative, inquiry learning Intelligent Tutoring System for ill-defined problem spaces. The common ground in the fields of Artificial Intelligence in Education and Computer-Supported Collaborative Learning is investigated to identify ways in which tutoring systems can employ both automated…
Descriptors: Coaching (Performance), Integrated Activities, Inquiry, Educational Environment
Sung, Ji Eun – ProQuest LLC, 2012
New products continue to launch quickly but many of them are converged products. The "new product" is not a completely new thing to consumers and the basic features stay the same. As a result, the added functions or fancy design can't explain why consumers adopt the new media. Past studies have examined perceptions of innovations or user…
Descriptors: Program Effectiveness, Innovation, Context Effect, Intention
Chebrolu, Shankar Babu – ProQuest LLC, 2010
Against the backdrop of new economic realities, one of the larger forces that is affecting businesses worldwide is cloud computing, whose benefits include agility, time to market, time to capability, reduced cost, renewed focus on the core and strategic partnership with the business. Cloud computing can potentially transform a majority of the…
Descriptors: Program Effectiveness, Information Technology, Correlation, Internet
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Knobel, Cory Philip – ProQuest LLC, 2010
Living inside built environments--infrastructure--it is easy to take for granted the things that we do not need to engage, but are at work behind the scenes nonetheless. Well-designed systems become invisible, but to engage them, how do we know which perspectives, objects, and relationships are useful? I examine the University of Michigan Digital…
Descriptors: Electronic Libraries, Organizational Change, Library Science, Library Services
Lee, Sang-Heui – ProQuest LLC, 2010
Although there have been a number of studies on large scale implementation of proprietary enterprise information systems (EIS), open-source software (OSS) for EIS has received limited attention in spite of its potential as a disruptive innovation. Cost saving is the main driver for adopting OSS among the other possible benefits including security…
Descriptors: Information Systems, Open Source Technology, Computer Software, Computer Software Evaluation
Fischer, Carl E. – ProQuest LLC, 2010
This research investigated the impact of automated cognitive assistants, specifically, the Personalized Assistant that Learns (PAL), on situational awareness, efficiency and effectiveness of decision making in the brigade combat team. PAL was recently commissioned by Defense Advanced Research Projects Agency (DARPA) to enhance decision making with…
Descriptors: Constructivism (Learning), Efficiency, Tests, Program Effectiveness
Anderson, George W. – ProQuest LLC, 2010
The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…
Descriptors: Program Effectiveness, Statistical Analysis, Transformational Leadership, Information Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis