Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Software Evaluation | 3 |
Computer System Design | 3 |
Costs | 3 |
Computer Interfaces | 2 |
Information Technology | 2 |
Cognitive Processes | 1 |
Cognitive Science | 1 |
Computer Mediated… | 1 |
Computer Security | 1 |
Computer Software | 1 |
Cost Effectiveness | 1 |
More ▼ |
Source
International Journal of… | 1 |
Author
Blessing, Stephen B. | 1 |
Gilbert, Stephen B. | 1 |
Moldoff, David K. | 1 |
Ourada, Stephen | 1 |
Ritter, Steven | 1 |
Senn, Gary J. | 1 |
Smyth, Thomas J. C. | 1 |
Publication Type
Speeches/Meeting Papers | 2 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Iowa | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Blessing, Stephen B.; Gilbert, Stephen B.; Ourada, Stephen; Ritter, Steven – International Journal of Artificial Intelligence in Education, 2009
Intelligent Tutoring Systems (ITSs) that employ a model-tracing methodology have consistently shown their effectiveness. However, what evidently makes these tutors effective, the cognitive model embedded within them, has traditionally been difficult to create, requiring great expertise and time, both of which come at a cost. Furthermore, an…
Descriptors: Intelligent Tutoring Systems, Cognitive Processes, Models, Expertise
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Moldoff, David K. – 1997
The purpose of this paper is to project present trends in application development into the next decades. The revolution in information technology has reduced the cost of computer hardware as well as communications. Networks will consist of three kinds of specialized components: clients, servers, and processors. Standardization of component…
Descriptors: Computer Mediated Communication, Computer Software Evaluation, Computer System Design, Costs