Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 6 |
Descriptor
Author
| Amin, Rohan Mahesh | 1 |
| Arickx, Frans | 1 |
| Broeckhove, Jan | 1 |
| Dietze, Stefan | 1 |
| Domingue, John | 1 |
| Gugliotta, Alessio | 1 |
| Nitinawarat, Sirin | 1 |
| Reyes Alamo, Jose M. | 1 |
| Stuer, Gunther | 1 |
| Sundresh, Sameer | 1 |
| Xu, Yiliang | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 5 |
| Guides - Classroom - Teacher | 3 |
| Journal Articles | 2 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
Audience
| Practitioners | 3 |
| Teachers | 3 |
Location
| Arkansas | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Dietze, Stefan; Gugliotta, Alessio; Domingue, John – International Journal of Distance Education Technologies, 2009
Current E-Learning technologies primarily follow a data and metadata-centric paradigm by providing the learner with composite content containing the learning resources and the learning process description, usually based on specific metadata standards such as ADL SCORM or IMS Learning Design. Due to the design-time binding of learning resources,…
Descriptors: Electronic Learning, Learning Processes, Educational Technology, Metadata
Sundresh, Sameer – ProQuest LLC, 2009
How do you dynamically customize the programming language available in a context within an existing system, without changing the underlying system? This dissertation introduces a language design approach that addresses this problem. The basic idea is to structure programs as systems of multiple interacting levels of abstraction, where all of the…
Descriptors: Programming Languages, Programming, Internet, Computer System Design
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewedStuer, Gunther; Broeckhove, Jan; Arickx, Frans – Internet Research, 2003
Presents the design and implementation of a reliable multipeer protocol (RMPP), which is written in Java and is suitable for applications in the area of distributed virtual environments (DVEs). Discusses motivation, protocol classification, design goals and the error recovery algorithm and lists implementation issues. Presents two possible…
Descriptors: Computer Networks, Computer Simulation, Computer System Design, Design Requirements
Ohio State Univ., Columbus. Center on Education and Training for Employment. – 1995
This publication contains 18 subjects appropriate for use in a competency list for the occupation of computer support technician, 1 of 12 12 occupations within the business/computer technologies cluster. Each unit consists of a number of competencies; a list of competency builders is provided for each competency. Titles of the 18 units are as…
Descriptors: Accounting, Business Administration, Business Education, Competence
Ohio State Univ., Columbus. Center on Education and Training for Employment. – 1995
This publication contains 22 subjects appropriate for use in a competency list for the occupation of computer (PC/network) coordinator, 1 of 12 occupations within the business/computer technologies cluster. Each unit consists of a number of competencies; a list of competency builders is provided for each competency. Titles of the 22 units are as…
Descriptors: Accounting, Business Administration, Business Education, Competence
Ohio State Univ., Columbus. Center on Education and Training for Employment. – 1995
This index allows the user to scan the competencies under each title for the 28 subjects appropriate for use in a competency list for the 12 occupations within the business/computer technologies cluster. Titles of the 28 units are as follows: employability skills; professionalism; teamwork; professional and ethical standards; economic and business…
Descriptors: Accounting, Business Administration, Competence, Competency Based Education

Direct link
