Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 8 |
| Since 2017 (last 10 years) | 14 |
| Since 2007 (last 20 years) | 164 |
Descriptor
| Computer System Design | 164 |
| Information Technology | 67 |
| Computer Software | 52 |
| Programming | 35 |
| Internet | 34 |
| Models | 26 |
| Information Systems | 23 |
| Computer Security | 22 |
| Computer Networks | 21 |
| Usability | 21 |
| Use Studies | 19 |
| More ▼ | |
Source
| ProQuest LLC | 164 |
Author
| AL Faresi, Ahmed | 1 |
| Abaas, Kanari | 1 |
| Ababneh, Mohammad | 1 |
| Agarwal, Mayank | 1 |
| Agyapong, Parick Kwadwo | 1 |
| Ahn, Jae-wook | 1 |
| Ali, Qasim | 1 |
| Alodhaibi, Khalid | 1 |
| Amin, Rohan Mahesh | 1 |
| An, Ho | 1 |
| Anderson, George W. | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 164 |
Education Level
| Higher Education | 22 |
| Adult Education | 9 |
| Postsecondary Education | 9 |
| Elementary Secondary Education | 6 |
| Secondary Education | 2 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 2 | 1 |
| Grade 5 | 1 |
| High Schools | 1 |
Audience
Location
| United States | 5 |
| Minnesota | 2 |
| Arkansas | 1 |
| Bangladesh | 1 |
| California | 1 |
| Indiana | 1 |
| Michigan | 1 |
| Nevada | 1 |
| New York | 1 |
| Pennsylvania | 1 |
| Taiwan | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Health Insurance Portability… | 1 |
Assessments and Surveys
| Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
Park, Dong-Jun – ProQuest LLC, 2011
Detection of events and actions in video entails substantial processing of very large, even open-ended, video streams. Video data present a unique challenge for the information retrieval community because properly representing video events is challenging. We propose a novel approach to analyze temporal aspects of video data. We consider video data…
Descriptors: Information Retrieval, Video Technology, Data Analysis, Search Strategies
Ko, Steven Y. – ProQuest LLC, 2009
In large-scale distributed infrastructures such as clouds, Grids, peer-to-peer systems, and wide-area testbeds, users and administrators typically desire to perform "on-demand operations" that deal with the most up-to-date state of the infrastructure. However, the scale and dynamism present in the operating environment make it challenging to…
Descriptors: Efficiency, Computer System Design
Rajkumar, Rajakrishnan – ProQuest LLC, 2012
Natural Language Generation (NLG) is the process of generating natural language text from an input, which is a communicative goal and a database or knowledge base. Informally, the architecture of a standard NLG system consists of the following modules (Reiter and Dale, 2000): content determination, sentence planning (or microplanning) and surface…
Descriptors: Natural Language Processing, Linguistics, Language Processing, Models
Harrell, J. Michael – ProQuest LLC, 2011
Enterprise architecture is a relatively new concept that arose in the latter half of the twentieth century as a means of managing the information technology resources within the enterprise. Borrowing from the disciplines of brick and mortar architecture, software engineering, software architecture, and systems engineering, the enterprise…
Descriptors: Information Technology, Case Studies, Computer Software, Business Administration
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Villegas, Rafael – ProQuest LLC, 2010
Remediating all vulnerabilities on computer systems in a timely and cost effective manner is difficult given that the window of time between the announcement of a new vulnerability and an automated attack has decreased. Hence, organizations need to prioritize the vulnerability remediation process on their computer systems. The goal of this…
Descriptors: Computer Security, Scoring, Risk Management, Measurement Techniques
Malik, Kshitiz – ProQuest LLC, 2009
Branch mispredicts have a first-order impact on the performance of integer applications. Control Independence (CI) architectures aim to overlap the penalties of mispredicted branches with useful execution by spawning control-independent work as separate threads. Although control independent, such threads may consume register and memory values…
Descriptors: Computer System Design, Performance, Engineering
Agarwal, Mayank – ProQuest LLC, 2009
The shift of the microprocessor industry towards multicore architectures has placed a huge burden on the programmers by requiring explicit parallelization for performance. Implicit Parallelization is an alternative that could ease the burden on programmers by parallelizing applications "under the covers" while maintaining sequential semantics…
Descriptors: Computers, Computer System Design, Programming
Boxwell, Stephen A. – ProQuest LLC, 2011
Treebanks are a necessary prerequisite for many NLP tasks, including, but not limited to, semantic role labeling. For many languages, however, treebanks are either nonexistent or too small to be useful. Time-critical applications may require rapid deployment of natural language software for a new critical language--much faster than the development…
Descriptors: Natural Language Processing, Training, Programming, Computer System Design
Jun, Soojin – ProQuest LLC, 2011
In the last two decades, emotion has emerged as an important theme in discussions of design. However, there is no framework to date that encompasses both emotion and information design in a single theory. This dissertation was motivated by a lack of substantive theory that would allow design researchers and educators to model the relationships…
Descriptors: Emotional Experience, Computer System Design, Perspective Taking, Rhetorical Theory
Dragon, Toby – ProQuest LLC, 2013
This thesis explores the design and evaluation of a collaborative, inquiry learning Intelligent Tutoring System for ill-defined problem spaces. The common ground in the fields of Artificial Intelligence in Education and Computer-Supported Collaborative Learning is investigated to identify ways in which tutoring systems can employ both automated…
Descriptors: Coaching (Performance), Integrated Activities, Inquiry, Educational Environment
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Mattord, Herbert J. – ProQuest LLC, 2012
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
Descriptors: Internet, Electronic Learning, Comparative Analysis, Benchmarking
Chetty, Marshini – ProQuest LLC, 2011
Technological infrastructure is often taken for granted in our day to day lives until it breaks down, usually because it invisibly supports tasks otherwise. Previous work in HCI has focused on how people react and deal with breaks in infrastructure as well as how to help people to fix or exploit these breaks. However, few have sought to understand…
Descriptors: Computer Networks, Physical Environment, Family Environment, Computer System Design

Direct link
