Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 148 |
| Since 2017 (last 10 years) | 265 |
| Since 2007 (last 20 years) | 450 |
Descriptor
Source
| ProQuest LLC | 450 |
Author
Publication Type
| Dissertations/Theses -… | 450 |
| Tests/Questionnaires | 4 |
Education Level
Audience
Location
| United States | 10 |
| California | 8 |
| Texas | 4 |
| Virginia | 4 |
| Pennsylvania | 3 |
| Tennessee | 3 |
| Florida | 2 |
| India | 2 |
| Indiana | 2 |
| Ireland | 2 |
| Kentucky | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Higher Education Act Title IX | 1 |
Assessments and Surveys
| Motivated Strategies for… | 3 |
| ACT Assessment | 2 |
| Kaufman Test of Educational… | 1 |
| Program for International… | 1 |
| Woodcock Johnson Tests of… | 1 |
What Works Clearinghouse Rating
Peng, Yefei – ProQuest LLC, 2010
An ontology mapping neural network (OMNN) is proposed in order to learn and infer correspondences among ontologies. It extends the Identical Elements Neural Network (IENN)'s ability to represent and map complex relationships. The learning dynamics of simultaneous (interlaced) training of similar tasks interact at the shared connections of the…
Descriptors: Training Methods, Genealogy, Logical Thinking, Cognitive Processes
Mingo, Wendye Dianne – ProQuest LLC, 2013
This study attempts to determine if authentic learning strategies can be used to acquire knowledge of and increase motivation for computational thinking. Over 600 students enrolled in a computer literacy course participated in this study which involved completing a pretest, posttest and motivation survey. The students were divided into an…
Descriptors: Learning Strategies, Computation, Thinking Skills, Computer Literacy
Ji, Shengyue – ProQuest LLC, 2011
Traditional information systems return answers after a user submits a complete query. Users often feel "left in the dark" when they have limited knowledge about the underlying data, and have to use a try-and-see approach for finding information. The trend of supporting autocomplete in these systems is a first step towards solving this problem. A…
Descriptors: Information Systems, Online Searching, Search Strategies, Computer Interfaces
Waters, Elsa G. – ProQuest LLC, 2012
This study was an effort to fill a gap in the research about why there are higher drop-out rates for students in online classrooms than students in traditional classrooms. Educators and administrators at online higher education institutions need information with which to address drop-out rates because the decreased number of completed online…
Descriptors: Community Colleges, Two Year College Students, Student Leadership, Leadership Qualities
Ratnabalasuriar, Sheruni – ProQuest LLC, 2012
This study explores experiences of women as they pursue post-secondary computing education in various contexts. Using in-depth interviews, the current study employs qualitative methods and draws from an intersectional approach to focus on how the various barriers emerge for women in different types of computing cultures. In-depth interviews with…
Descriptors: Females, Computer Science Education, Postsecondary Education, Student Experience
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Ryoo, Jean Jinsun – ProQuest LLC, 2013
Computing occupations are among the fastest growing in the U.S. and technological innovations are central to solving world problems. Yet only our most privileged students are learning to use technology for creative purposes through rigorous computer science education opportunities. In order to increase access for diverse students and females who…
Descriptors: Teaching Methods, Computer Science, Critical Theory, Student Diversity
The Domain Shared by Computational and Digital Ontology: A Phenomenological Exploration and Analysis
Compton, Bradley Wendell – ProQuest LLC, 2009
The purpose of this dissertation is to explore and analyze a domain of research thought to be shared by two areas of philosophy: computational and digital ontology. Computational ontology is philosophy used to develop information systems also called computational ontologies. Digital ontology is philosophy dealing with our understanding of Being…
Descriptors: Phenomenology, Philosophy, Information Systems, Case Studies
Mainier, Michael J. – ProQuest LLC, 2011
This study identified the teaching beliefs, intentions, and actions of 80 introductory computer programming (CS1) faculty members from institutions of higher education in the United States using the Teacher Perspectives Inventory. Instruction method used inside the classroom, categorized by ACM CS1 curriculum guidelines, was also captured along…
Descriptors: Computer Science Education, Programming, Introductory Courses, College Faculty
Dong, Xiao – ProQuest LLC, 2010
Workflow technology has emerged as an eminent way to support scientific computing nowadays. Supported by mature technological infrastructures such as web services and high performance computing infrastructure, workflow technology has been well adopted by scientific community as it offers an effective framework to prototype, modify and manage…
Descriptors: Work Environment, Data Processing, Pattern Recognition, Semantics
Caudle, Daryl L. – ProQuest LLC, 2010
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Descriptors: Information Systems, Organizational Change, Telecommunications, Information Technology
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
The Effects of Beacons, Comments, and Tasks on Program Comprehension Process in Software Maintenance
Fan, Quyin – ProQuest LLC, 2010
Program comprehension is the most important and frequent process in software maintenance. Extensive research has found that individual characteristics of programmers, differences of computer programs, and differences of task-driven motivations are the major factors that affect the program comprehension results. There is no study specifically…
Descriptors: Computer Software, Maintenance, Programming, Employees
Ehrlich, Justin – ProQuest LLC, 2010
The application of virtual reality is becoming ever more important as technology reaches new heights allowing virtual environments (VE) complete with global illumination. One successful application of virtual environments is educational interventions meant to treat individuals with autism spectrum disorder (ASD). VEs are effective with these…
Descriptors: Realism, Intervention, Computer Simulation, Autism

Direct link
