Publication Date
| In 2026 | 0 |
| Since 2025 | 38 |
| Since 2022 (last 5 years) | 185 |
| Since 2017 (last 10 years) | 349 |
| Since 2007 (last 20 years) | 425 |
Descriptor
Source
Author
| Bers, Marina Umaschi | 7 |
| Barnes, Tiffany | 4 |
| Abdullahi Yusuf | 3 |
| Ching, Yu-Hui | 3 |
| Clarke-Midura, Jody | 3 |
| Joy, Mike | 3 |
| Kynigos, Chronis | 3 |
| Lee, Victor R. | 3 |
| Shumway, Jessica F. | 3 |
| Zhanxia Yang | 3 |
| Baldwin, Sally | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 11 |
| Media Staff | 2 |
| Researchers | 2 |
| Policymakers | 1 |
| Practitioners | 1 |
Location
| Turkey | 15 |
| Australia | 5 |
| Spain | 5 |
| United Kingdom (England) | 5 |
| California | 4 |
| China | 4 |
| Italy | 4 |
| Canada | 3 |
| Cyprus | 3 |
| Finland | 3 |
| Ghana | 3 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
Knight, D.G. – International Journal of Mathematical Education in Science and Technology, 2008
The determination of bounds for A(n, d, w), the maximum possible number of binary vectors of length n, weight w, and pairwise Hamming distance no less than d, is a classic problem in coding theory. Such sets of vectors have many applications. A description is given of how the problem can be used in a first-year undergraduate computational…
Descriptors: Mathematics Instruction, College Freshmen, Programming, Coding
Gurski, Katharine F. – PRIMUS, 2009
We describe two short group projects for finite mathematics students that incorporate matrices and linear programming into fictional consulting requests presented as a letter to the students. The students are required to use mathematics to decrypt secret messages in one project involving matrix multiplication and inversion. The second project…
Descriptors: Mathematical Applications, Mathematics Instruction, Learner Engagement, Student Projects
Holm, Jennifer, Ed.; Mathieu-Soucy, Sarah, Ed. – Canadian Mathematics Education Study Group, 2019
In June 2018 the Canadian Mathematics Education Study Group/Groupe Canadien d'étude en didactique des mathématiques (CMESG/GCEDM) held its 42nd meeting in the idyllic setting of Squamish, British Columbia. This meeting marked the first time CMESG/GCEDM had been in British Columbia since 2010 and the first time it had been held at Quest University.…
Descriptors: Mathematics Education, Mathematics Teachers, Teaching Methods, Interdisciplinary Approach
Renumol, V. G.; Janakiram, Dharanipragada; Jayaprakash, S. – ACM Transactions on Computing Education, 2010
Identifying the set of cognitive processes (CPs) a student can go through during computer programming is an interesting research problem. It can provide a better understanding of the human aspects in computer programming process and can also contribute to the computer programming education in general. The study identified the presence of a set of…
Descriptors: Protocol Analysis, Classification, Cognitive Processes, Thinking Skills
Tong, Qi (Helen) – Computers in Libraries, 2009
The U.S. Geological Survey (USGS) Library, where the author serves as the digital services librarian, is increasingly challenged to make it easier for users to find information from many heterogeneous information sources. Information is scattered throughout different software applications (i.e., library catalog, federated search engine, link…
Descriptors: Search Engines, Engines, Information Sources, Internet
White, Tobin – Educational Studies in Mathematics, 2009
This paper introduces an applied problem-solving task, set in the context of cryptography and embedded in a network of computer-based tools. This designed learning environment engaged students in a series of collaborative problem-solving activities intended to introduce the topic of functions through a set of linked representations. In a…
Descriptors: Problem Solving, Educational Environment, Problem Based Learning, Mathematical Applications
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Isaías, Pedro, Ed.; Hui, Wendy, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and poster of the 6th International Conference on Educational Technologies 2019 (ICEduTech 2019), which has been organised by the International Association for Development of the Information Society and co-organised by the Lingnan University, in Hong Kong, February 8-10, 2019. ICEduTech is the scientific…
Descriptors: Educational Technology, Elementary School Students, Reflection, Computer Mediated Communication
Norton, Julie E.; Gieve, Simon – Language Awareness, 2010
This paper explores how "native" and "non-native" speaker identities are created in the discourse of television lifestyle, travel, and documentary genres where an English "native speaker" audience is assumed. It presents a coding system for analysing the representation of actors in television programmes and examines…
Descriptors: Metalinguistics, Discourse Analysis, Native Speakers, Television
Ohler, Jason – Learning & Leading with Technology, 2010
The Information Age has been built, in part, on the belief that more information is always better. True to that sentiment, people have found ways to make a lot of information available to the masses--perhaps more than anyone ever imagined. The goal of the Semantic Web, often called Web 3.0, is for users to spend less time looking for information…
Descriptors: Internet, Technological Advancement, Mass Media, Information Dissemination
Peer reviewedDuval, Beverly K.; Main, Linda – Library Software Review, 1995
Provides a succinct guide to building a home page. Overview includes the main Hypertext Mark-up Language (HTML) tags, plus examples of their use; forms and clickable maps; new HTML 3.0 tags; and pointers to sites that contain HTML editors, graphics, backgrounds, and music. Five figures illustrate the text. (JKP)
Descriptors: Authoring Aids (Programming), Coding, Computer Software, Guides
Roy, Geoffrey G. – Journal on Educational Resources in Computing, 2006
Designing and explaining programs are often difficult tasks, especially when novices are involved. It also concerns more experienced programmers when complex algorithms need to be carefully explained and documented as part of software development.Good practice suggests that code and documentation be tightly coupled; but there are only a few…
Descriptors: Programming, Computer Software, Mathematics, Models
Tan, Lin – ProQuest LLC, 2009
Commenting source code has long been a common practice in software development. This thesis, consisting of three pieces of work, made novel use of the code comments written in natural language to improve software reliability. Our solution combines Natural Language Processing (NLP), Machine Learning, Statistics, and Program Analysis techniques to…
Descriptors: Computer Software, Coding, Reliability, Improvement
Buchanan, Larry – MultiMedia Schools, 1996
Defines HyperText Markup Language (HTML) as it relates to the World Wide Web (WWW). Describes steps needed to create HTML files on a UNIX system and to make them accessible via the WWW. Presents a list of basic HTML formatting codes and explains the coding used in the author's personal HTML file. (JMV)
Descriptors: Access to Information, Authoring Aids (Programming), Coding, Guidelines
Newby, Michael; Nguyen, ThuyUyen – Journal of Information Systems Education, 2007
Programming assignments are used to assess a student's understanding of the theoretical aspect of programming and their ability to put that theory into practice. When assigning programs for students to complete, it is necessary to make sure that the problem is well specified, realistic, yet is able to be completed in a relatively short period of…
Descriptors: Assignments, Problem Solving, Programming, Information Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Direct link
