Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 177 |
| Since 2017 (last 10 years) | 368 |
| Since 2007 (last 20 years) | 943 |
Descriptor
Source
| ProQuest LLC | 943 |
Author
| Abdulrahman Alshammari | 1 |
| Abedtash, Hamed | 1 |
| Acharya, Jayadev | 1 |
| Adam Pfau | 1 |
| Adamo, Oluwayomi | 1 |
| Adefope, Olufunke | 1 |
| Adeyeye, Adebisi | 1 |
| Adkins, Joni K. | 1 |
| Agada, Chuks N. | 1 |
| Ahmed Abu Ghoush | 1 |
| Ahn, Jae-wook | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 943 |
| Tests/Questionnaires | 3 |
Education Level
Audience
| Practitioners | 2 |
| Teachers | 2 |
| Researchers | 1 |
Location
| California | 21 |
| United States | 18 |
| Texas | 14 |
| Pennsylvania | 12 |
| North Carolina | 10 |
| Florida | 7 |
| New York | 7 |
| China | 6 |
| Georgia | 6 |
| Ohio | 6 |
| South Korea | 6 |
| More ▼ | |
Laws, Policies, & Programs
| No Child Left Behind Act 2001 | 3 |
| Digital Millennium Copyright… | 1 |
| G I Bill | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
| Does not meet standards | 2 |
Kim, Jae Dong – ProQuest LLC, 2011
Since sub-sentential alignment is critically important to the translation quality of an Example-Based Machine Translation (EBMT) system, which operates by finding and combining phrase-level matches against the training examples, we developed a new alignment algorithm for the purpose of improving the EBMT system's performance. This new…
Descriptors: Computational Linguistics, Translation, Second Languages, Accuracy
Pai, Vinay – ProQuest LLC, 2011
The increasing popularity of high-bandwidth Internet connections has enabled new applications like the online delivery of high-quality audio and video content. Conventional server-client approaches place the entire burden of delivery on the content provider's server, making these services expensive to provide. A peer-to-peer approach allows end…
Descriptors: Video Technology, Program Effectiveness, Internet, Information Technology
Kang, Keumseok – ProQuest LLC, 2011
Managing software development is a very complex activity because it must deal with people, organizations, technologies, and business processes. My dissertation consists of three studies that examine software development management from various perspectives. The first study empirically investigates the impacts of prior experience with similar…
Descriptors: Computer Software, Administration, Prior Learning, Time
Black, August – ProQuest LLC, 2011
The research presented in this dissertation studies and describes how technical standards, protocols, and application programming interfaces (APIs) shape the aesthetic, functional, and affective nature of our most dominant mode of online communication, the World Wide Web (WWW). I examine the politically charged and contentious battle over browser…
Descriptors: Internet, Web Browsers, Standards, Economic Factors
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Phair, Derek – ProQuest LLC, 2012
This qualitative exploratory single-case study was designed to examine and understand the use of volunteer community participants as software developers and other project related roles, such as testers, in completing a web-based application project by a non-profit organization. This study analyzed the strategic decision to engage crowd…
Descriptors: Electronic Publishing, Collaborative Writing, Web Sites, Computer Software
Manzano, Debbie L. – ProQuest LLC, 2012
The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…
Descriptors: Information Security, Behavior, Safety, Statistical Analysis
Punch, Raymond J. – ProQuest LLC, 2012
The purpose of the quantitative regression study was to explore and to identify relationships between attitudes toward use and perceptions of value of computer-based simulation programs, of college instructors, toward computer based simulation programs. A relationship has been reported between attitudes toward use and perceptions of the value of…
Descriptors: College Faculty, Teacher Attitudes, Computer Simulation, Regression (Statistics)
Williams, Regina Gavin – ProQuest LLC, 2016
The purpose of the study was to examine the effects of customized individual counseling interventions on the career and college readiness of adolescents within foster care. An intervention program, consisting of customized individual interventions, entitled "Students That Are Reaching Success" ("S.T.A.R.S.") was created by the…
Descriptors: Career Counseling, Intervention, College Readiness, Foster Care
Malcolm, Peter – ProQuest LLC, 2013
The ability and to make good estimates is essential, as is the ability to assess the reasonableness of estimates. These abilities are becoming increasingly important as digital technologies transform the ways in which people work. To estimate is to provide an approximation to a problem that is mathematical in nature, and the ability to estimate is…
Descriptors: Middle School Students, Grade 7, Mathematics Skills, Computation
Henry-Young, Marcia – ProQuest LLC, 2013
The purpose of this qualitative phenomenological study was to identify, classify, and interpret, through the lived experiences of teachers, the subjective barriers to the use of new communications technology in the classroom. Three questions guided this study: (a) What in the teacher's experience prevented him or her in the adoption and active use…
Descriptors: Barriers, Technology Integration, Teacher Attitudes, Teacher Education
Haley, M. – ProQuest LLC, 2013
The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…
Descriptors: Manufacturing, Information Technology, Armed Forces, Aerospace Education
Nguyen, Andrew V. – ProQuest LLC, 2013
Physicians, nurses, and other clinical staff rely on alarms from various bedside monitors and sensors to alert when there is a change in the patient's clinical status, typically when urgent intervention is necessary. These alarms are usually embedded directly within the sensor or monitor and lacks the context of the patient's medical history and…
Descriptors: Hospitals, Nurses, Physicians, Intervention
Gupta, Manish – ProQuest LLC, 2011
Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…
Descriptors: Information Technology, Computer Security, Organizations (Groups), Global Approach
Harrell, J. Michael – ProQuest LLC, 2011
Enterprise architecture is a relatively new concept that arose in the latter half of the twentieth century as a means of managing the information technology resources within the enterprise. Borrowing from the disciplines of brick and mortar architecture, software engineering, software architecture, and systems engineering, the enterprise…
Descriptors: Information Technology, Case Studies, Computer Software, Business Administration

Direct link
