Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 5 |
Computer System Design | 5 |
Program Effectiveness | 5 |
Computer Mediated… | 2 |
Computer Security | 2 |
Programming | 2 |
Telecommunications | 2 |
Academic Achievement | 1 |
Access to Information | 1 |
Animals | 1 |
Audio Equipment | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Elementary Education | 1 |
Audience
Location
Arkansas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Legutko, Robert S. – Online Submission, 2007
Background: The idea for attempting a distance tutoring project between university tutors and elementary school students using Microsoft NetMeeting was conceived: (a) to provide a new experience mentoring children for university students pursuing a teaching certificate, (b) for university students to utilize technology in pedagogy, (c) as an…
Descriptors: Elementary School Students, College Students, Tutors, Tutoring

Anderson, Greg – Library Hi Tech, 1993
Discusses the evaluation, design, and objectives of the Distributed Library Initiative at the Massachusetts Institute of Technology (MIT), an ongoing project collaboratively designed by MIT Information Systems and the MIT Libraries to provide students and faculty with easy access to leading electronic technologies for research and educational…
Descriptors: College Libraries, Computer Centers, Computer Networks, Computer System Design