NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Massachusetts Comprehensive…1
What Works Clearinghouse Rating
Showing 1 to 15 of 55 results Save | Export
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Baker, Stewart C. – Journal of Library & Information Services In Distance Learning, 2014
This article argues that accessibility and universality are essential to good Web design. A brief review of library science literature sets the issue of Web accessibility in context. The bulk of the article explains the design philosophies of progressive enhancement and responsive Web design, and summarizes recent updates to WCAG 2.0, HTML5, CSS…
Descriptors: Web Sites, Computer System Design, Computer Software, Computer Software Reviews
Malaika, Majid A. – ProQuest LLC, 2011
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
Descriptors: Internet, Programming, Automation, Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Lama, Manuel; Vidal, Juan C.; Otero-Garcia, Estefania; Bugarin, Alberto; Barro, Senen – Educational Technology & Society, 2012
Large-sized repositories of learning objects (LOs) are difficult to create and also to maintain. In this paper we propose a way to reduce this drawback by improving the classification mechanisms of the LO repositories. Specifically, we present a solution to automate the LO classification of the Universia repository, a collection of more than 15…
Descriptors: Foreign Countries, Electronic Libraries, Metadata, Programming
Whitfield, Sharon – Computers in Libraries, 2011
A 2010 electronic resource management survey conducted by Maria Collins of North Carolina State University and Jill E. Grogg of University of Alabama Libraries found that the top six electronic resources management priorities included workflow management, communications management, license management, statistics management, administrative…
Descriptors: Information Storage, Database Management Systems, Program Implementation, Library Automation
Peer reviewed Peer reviewed
Direct linkDirect link
Barba, Ian; Cassidy, Ryan; De Leon, Esther; Williams, B. Justin – Journal of Web Librarianship, 2013
Proper planning and assessment surveys of projects for academic library Web sites will not always be predictive of real world use, no matter how many responses they might receive. In this case, multiple-phase development, librarian focus groups, and patron surveys performed before implementation of such a project inaccurately overrated utility and…
Descriptors: Behavior Patterns, Behavioral Science Research, Academic Libraries, Web 2.0 Technologies
Peer reviewed Peer reviewed
Direct linkDirect link
Zualkernan, Imran A.; El-Naaj, Salim Abou; Papadopoulos, Maria; Al-Amoudi, Budoor K.; Matthews, Charles E. – Educational Technology & Society, 2009
Computer software is pervasive in today's society. The rate at which new versions of computer software products are released is phenomenal when compared to the release rate of new products in traditional industries such as aircraft building. This rapid rate of change can partially explain why most certifications in the software industry are…
Descriptors: Computer Software, Evaluation, Online Systems, Technical Occupations
Peer reviewed Peer reviewed
Direct linkDirect link
Poulos, Marios; Korfiatis, Nikolaos; Bokos, George – Program: Electronic Library and Information Systems, 2011
Purpose: This paper aims to present the semantic content identifier (SCI), a permanent identifier, computed through a linear-time onion-peeling algorithm that enables the extraction of semantic features from a text, and the integration of this information within the permanent identifier. Design/methodology/approach: The authors employ SCI to…
Descriptors: Semantics, Copyrights, Electronic Libraries, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Cechinel, Cristian; Sanchez-Alonso, Salvador; Garcia-Barriocanal, Elena – Computers & Education, 2011
The continuously growth of learning resources available in on-line repositories has raised the concern for the development of automated methods for quality assessment. The current existence of on-line evaluations in such repositories has opened the possibility of searching for statistical profiles of highly-rated resources that can be used as…
Descriptors: Discriminant Analysis, Educational Resources, Classification, Automation
Peer reviewed Peer reviewed
Direct linkDirect link
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Terlaga, Amy – Computers in Libraries, 2010
In March 2007, SirsiDynix notified its Horizon and classic Dynix customers that it would not be releasing Horizon 8.0 in favor of developing its Unicorn software. As vice president/president-elect of SirsiDynix's Horizon/Dynix user group, the author was one of the first ones to be notified of this abrupt change in company strategy. The news sent…
Descriptors: Strategic Planning, Computer Software, Public Libraries, Library Associations
Peer reviewed Peer reviewed
Direct linkDirect link
Thomas, M. S.; Kothari, D. P.; Prakash, A. – IEEE Transactions on Education, 2011
Automation of power systems is gaining momentum across the world, and there is a need to expose graduate and undergraduate students to the latest developments in hardware, software, and related protocols for power automation. This paper presents the design, development, and commissioning of an automation lab to facilitate the understanding of…
Descriptors: Foreign Countries, Undergraduate Students, Graduate Students, Computer Assisted Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Lampi, Fleming; Lemelson, Hendrik; Kopf, Stephan; Effelsberg, Wolfgang – Interactive Technology and Smart Education, 2009
Purpose: The purpose of this paper is describing the seamless integration of the question-answer interaction into automatic lecture recordings (ALRs). This includes the design and implementation of the question management (QM) software for a virtual camera team. Design/methodology/approach: Coming from the human role model the interaction and its…
Descriptors: Computer Software, Interaction, Lecture Method, Classroom Environment
Sheehan, Kate – Computers in Libraries, 2009
Darien Library, where the author serves as head of knowledge and learning services, launched a new website on September 1, 2008. The website is built with Drupal, an open source content management system (CMS). In this article, the author describes how she and her colleagues overhauled the library's website to provide an open source content…
Descriptors: Computer Software, Database Management Systems, Web Sites, Library Automation
Jabba Molinares, Daladier – ProQuest LLC, 2009
Communication underwater is challenging because of the inherent characteristics of the media. First, common radio frequency (RF) signals utilized in wireless communications cannot be used under water. RF signals are attenuated in such as way that RF communication underwater is restricted to very few meters. As a result, acoustic-based…
Descriptors: Acoustics, Internet, Telecommunications, Information Technology
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4