Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Coding | 4 |
Computer Software Evaluation | 4 |
Computer System Design | 3 |
Programming | 3 |
Computer Science Education | 2 |
Computer Security | 2 |
Computer Software | 2 |
Programming Languages | 2 |
Statistical Analysis | 2 |
Access to Information | 1 |
Biological Sciences | 1 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Drasutis, Sigitas | 1 |
Iannotti, Nicholas V. | 1 |
Motekaityte, Vida | 1 |
Noreika, Algirdas | 1 |
Zheng, Yongjie | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zheng, Yongjie – ProQuest LLC, 2012
Software architecture plays an increasingly important role in complex software development. Its further application, however, is challenged by the fact that software architecture, over time, is often found not conformant to its implementation. This is usually caused by frequent development changes made to both artifacts. Against this background,…
Descriptors: Client Server Architecture, Computer Software, Programming, Computer Software Evaluation
Iannotti, Nicholas V. – ProQuest LLC, 2013
The last several years have seen unprecedented advancements in the application of technology to the life sciences, particularly in the area of data generation. Novel scientific insights are now often driven primarily by software development supporting new multidisciplinary and increasingly multifaceted data analysis. However, despite the…
Descriptors: Biological Sciences, Computer Software, Computer System Design, Recycling
Drasutis, Sigitas; Motekaityte, Vida; Noreika, Algirdas – Informatics in Education, 2010
The Internet has recently encouraged the society to convert almost all its needs to electronic resources such as e-libraries, e-cultures, e-entertainment as well as e-learning, which has become a radical idea to increase the effectiveness of learning services in most schools, colleges and universities. E-learning can not be completely featured and…
Descriptors: Computer Science Education, Computer System Design, Computer Software Evaluation, Programming
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis