Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 24 |
Descriptor
Computer Networks | 57 |
Computer Science | 57 |
Telecommunications | 28 |
Information Technology | 25 |
Computer System Design | 17 |
Information Networks | 16 |
Computer Oriented Programs | 15 |
Higher Education | 14 |
Data Processing | 12 |
Computer Peripherals | 11 |
Computer Security | 11 |
More ▼ |
Source
Author
Dixit, R. K. | 2 |
Acheampong, Zoe | 1 |
Amin, Rohan Mahesh | 1 |
Appuswamy, Rathinakumar | 1 |
Atkins, D. E. | 1 |
Babb, Jeffry S. | 1 |
Beckham, Bonnie | 1 |
Bhagyavati | 1 |
Blake, Cecil | 1 |
Bowman, Michael | 1 |
Brown, Maxine D. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 14 |
Postsecondary Education | 9 |
Elementary Secondary Education | 2 |
High Schools | 2 |
Secondary Education | 2 |
Two Year Colleges | 1 |
Audience
Practitioners | 7 |
Policymakers | 4 |
Students | 2 |
Teachers | 1 |
Location
Texas | 3 |
United Kingdom | 3 |
Germany | 2 |
Italy | 2 |
Japan | 2 |
Netherlands | 2 |
Portugal | 2 |
Spain | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Goulden, Murray; Greiffenhagen, Christian; Crowcroft, Jon; McAuley, Derek; Mortier, Richard; Radenkovic, Milena; Sathiaseelan, Arjuna – International Journal of Social Research Methodology, 2017
Drawing on the experiences of a novel collaborative project between sociologists and computer scientists, this paper identifies a set of challenges for fieldwork that are generated by this "wild interdisciplinarity. Public Access Wi-Fi Service" was a project funded by an 'in-the-wild' research programme, involving the study of digital…
Descriptors: Ethnography, Computer Science, Interdisciplinary Approach, Sociology
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Perez, Jerry F. – ProQuest LLC, 2013
The goal of the dissertation study was to evaluate the existing DG scheduling algorithm. The evaluation was developed through previously explored simulated analyses of DGs performed by researchers in the field of DG scheduling optimization and to improve the current RT framework of the DG at TTU. The author analyzed the RT of an actual DG, thereby…
Descriptors: Computer Science, Scheduling, Mathematics, Universities
Appuswamy, Rathinakumar – ProQuest LLC, 2011
In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…
Descriptors: Computer Networks, Computation, Problem Solving, Computer Science
Rider, Andrew Kent – ProQuest LLC, 2013
Data in many growing fields has an underlying network structure that can be taken advantage of. In this dissertation we apply data and network science to problems in the domains of systems biology and healthcare. Data challenges in these fields include noisy, heterogeneous data, and a lack of ground truth. The primary thesis of this work is that…
Descriptors: Computer Networks, Computer Science, Biological Sciences, Health Sciences
Giordano, Eugenio – ProQuest LLC, 2011
Many of the devices we interact with on a daily basis are currently equipped with wireless connectivity. Soon this will be extended to the vehicles we drive/ride every day. Wirelessly connected vehicles will form a new kind of network that will enable a wide set of innovative applications ranging from enhanced safety to entertainment. To…
Descriptors: Telecommunications, Computer Networks, Motor Vehicles, Mobility
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Nihalani, Priya K.; Mayrath, Michael; Robinson, Daniel H. – Journal of Educational Psychology, 2011
We investigated the effects of feedback and collaboration on undergraduates' transfer performance when using a computer networking training simulation. In Experiment 1, 65 computer science "novices" worked through an instructional protocol individually (control), individually with feedback, or collaboratively with feedback. Unexpectedly,…
Descriptors: Expertise, Feedback (Response), Computer Simulation, Prior Learning
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Sherrell, Linda; Krishna, Bhagavathy; Velaga, Natasha; Vejandla, Pavan; Satharla, Mahesh – Journal of Computers in Mathematics and Science Teaching, 2010
Agile methodologies have become increasingly popular among software developers as evidenced by industrial participation at related conferences. The popularity of agile practices over traditional techniques partly stems from the fact that these practices provide for more customer involvement and better accommodate rapidly changing requirements,…
Descriptors: Computer Software, Methods, Independent Study, Graduate Students
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers