NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Blessing, Stephen B.; Gilbert, Stephen B.; Ourada, Stephen; Ritter, Steven – International Journal of Artificial Intelligence in Education, 2009
Intelligent Tutoring Systems (ITSs) that employ a model-tracing methodology have consistently shown their effectiveness. However, what evidently makes these tutors effective, the cognitive model embedded within them, has traditionally been difficult to create, requiring great expertise and time, both of which come at a cost. Furthermore, an…
Descriptors: Intelligent Tutoring Systems, Cognitive Processes, Models, Expertise
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Computing, 1999
Presents a general review of features of version 2.1 of Total Library Computerization (TLC) for Windows from On Point, Inc. Includes information about pricing, hardware and operating systems, modules/functions available, user interface, security, on-line catalog functions, circulation, cataloging, and documentation and online help. A table…
Descriptors: Bibliographic Records, Computer Interfaces, Computer Software, Computer System Design