Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 13 |
Descriptor
Source
Author
Publication Type
| Journal Articles | 9 |
| Reports - Descriptive | 6 |
| Reports - Research | 3 |
| Collected Works - Proceedings | 2 |
| Reports - Evaluative | 2 |
| Speeches/Meeting Papers | 2 |
Education Level
| Higher Education | 8 |
| Postsecondary Education | 8 |
| Elementary Secondary Education | 2 |
| Adult Education | 1 |
| Elementary Education | 1 |
| Grade 10 | 1 |
| Grade 12 | 1 |
| Grade 4 | 1 |
| Grade 7 | 1 |
| Grade 8 | 1 |
| Grade 9 | 1 |
| More ▼ | |
Audience
| Teachers | 1 |
Location
| Australia | 2 |
| Israel | 2 |
| Netherlands | 2 |
| Pennsylvania | 2 |
| Spain | 2 |
| United Kingdom | 2 |
| Washington | 2 |
| Asia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Czech Republic | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Massachusetts Comprehensive… | 1 |
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Andrea Domínguez-Lara; Wulfrano Arturo Luna-Ramírez – International Association for Development of the Information Society, 2022
The automatic code generation is the process of generating source code snippets from a program, i.e., code for generating code. Its importance lies in facilitating software development, particularly important is helping in the implementation of software designs such as engineering diagrams, in such a case, automatic code generation copes with the…
Descriptors: Programming, Coding, Computer Software, Programming Languages
Waguespack, Leslie J. – Information Systems Education Journal, 2013
This paper presents a learning unit that addresses quality design in relational data models. The focus on modeling allows the learning to span analysis, design, and implementation enriching pedagogy across the systems development life cycle. Thriving Systems Theory presents fifteen choice properties that convey design quality in models integrating…
Descriptors: Units of Study, Design, Data, Models
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Cross, James H., II; Hendrix, T. Dean; Umphress, David A.; Barowski, Larry A.; Jain, Jhilmil; Montgomery, Lacey N. – ACM Transactions on Computing Education, 2009
jGRASP has three integrated approaches for interacting with its dynamic viewers for data structures: debugger, workbench, and text-based interactions that allow individual Java statements and expressions to be executed/evaluated. These approaches can be used together to provide a complementary set of interactions with the dynamic viewers. Data…
Descriptors: Textbooks, Interaction, Methods, Computer Science Education
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Yarosh, Svetlana; Guzdial, Mark – Journal on Educational Resources in Computing, 2008
Learning computing with respect to the context of its use has been linked in previous reports to student motivation in introductory Computer Science (CS) courses. In this report, we consider the role of context in a second course. We present a case study of a CS2 data structures class that uses a media computation context. In this course, students…
Descriptors: Relevance (Education), Learner Engagement, Instructional Design, Case Studies
Bruce-Lockhart, Michael; Norvell, Theodore; Crescenzi, Pierluigi – ACM Transactions on Computing Education, 2009
We propose an extension of the Teaching Machine project, called Quiz Generator, that allows instructors to produce assessment quizzes in the field of algorithm and data structures quite easily. This extension makes use of visualization techniques and is based on new features of the Teaching Machine that allow third-party visualizers to be added as…
Descriptors: Tests, Mathematics, Visualization, Test Construction
Edgington, Theresa M. – Journal of Information Technology Education: Innovations in Practice, 2011
Text analytics refers to the process of analyzing unstructured data from documented sources, including open-ended surveys, blogs, and other types of web dialog. Text analytics has enveloped the concept of text mining, an analysis approach influenced heavily from data mining. While text mining has been covered extensively in various computer…
Descriptors: Feedback (Response), Constructivism (Learning), Web Sites, Class Activities
Madhyastha, Tara M.; Tanimoto, Steven – International Working Group on Educational Data Mining, 2009
Most of the emphasis on mining online assessment logs has been to identify content-specific errors. However, the pattern of general "consistency" is domain independent, strongly related to performance, and can itself be a target of educational data mining. We demonstrate that simple consistency indicators are related to student outcomes,…
Descriptors: Web Based Instruction, Computer Assisted Testing, Computer Software, Computer Science Education
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Barnes, Tiffany, Ed.; Desmarais, Michel, Ed.; Romero, Cristobal, Ed.; Ventura, Sebastian, Ed. – International Working Group on Educational Data Mining, 2009
The Second International Conference on Educational Data Mining (EDM2009) was held at the University of Cordoba, Spain, on July 1-3, 2009. EDM brings together researchers from computer science, education, psychology, psychometrics, and statistics to analyze large data sets to answer educational research questions. The increase in instrumented…
Descriptors: Data Analysis, Educational Research, Conferences (Gatherings), Foreign Countries
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
