NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Blessing, Stephen B.; Gilbert, Stephen B.; Ourada, Stephen; Ritter, Steven – International Journal of Artificial Intelligence in Education, 2009
Intelligent Tutoring Systems (ITSs) that employ a model-tracing methodology have consistently shown their effectiveness. However, what evidently makes these tutors effective, the cognitive model embedded within them, has traditionally been difficult to create, requiring great expertise and time, both of which come at a cost. Furthermore, an…
Descriptors: Intelligent Tutoring Systems, Cognitive Processes, Models, Expertise
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Moldoff, David K. – 1997
The purpose of this paper is to project present trends in application development into the next decades. The revolution in information technology has reduced the cost of computer hardware as well as communications. Networks will consist of three kinds of specialized components: clients, servers, and processors. Standardization of component…
Descriptors: Computer Mediated Communication, Computer Software Evaluation, Computer System Design, Costs