NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Motivated Strategies for…1
What Works Clearinghouse Rating
Showing 1 to 15 of 118 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Austin M. Shin; Ayaan M. Kazerouni – ACM Transactions on Computing Education, 2024
Background and Context: Students' programming projects are often assessed on the basis of their tests as well as their implementations, most commonly using test adequacy criteria like branch coverage, or, in some cases, mutation analysis. As a result, students are implicitly encouraged to use these tools during their development process (i.e., so…
Descriptors: Feedback (Response), Programming, Student Projects, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Heinsen Egan, Matthew; McDonald, Chris – Computer Science Education, 2021
Background and Context: Students learning the C programming language struggle to debug, and to understand the runtime behaviour of, their programs. Objective: We examine a tool that combines several novice-focused error detection, program visualization, and debugging techniques, to investigate which features students use in real study sessions,…
Descriptors: Computer Science Education, Programming Languages, Programming, Novices
Peer reviewed Peer reviewed
Direct linkDirect link
Novak, Matija; Joy, Mike; Kermek, Dragutin – ACM Transactions on Computing Education, 2019
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers.…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sychev, Oleg; Penskoy, Nikita; Anikin, Anton; Denisov, Mikhail; Prokudin, Artem – Education Sciences, 2021
Intelligent tutoring systems have become increasingly common in assisting students but are often aimed at isolated subject-domain tasks without creating a scaffolding system from lower- to higher-level cognitive skills, with low-level skills often neglected. We designed and developed an intelligent tutoring system, CompPrehension, which aims to…
Descriptors: Intelligent Tutoring Systems, Comprehension, Undergraduate Students, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Kanika; Chakraverty, Shampa; Chakraborty, Pinaki – Journal of Educational Technology Systems, 2020
Courses on computer programming are included in the curricula of almost all engineering disciplines. We surveyed the research literature and identified the techniques that are commonly used by instructors for teaching these courses. We observed that visual programming and game-based learning can enhance computational thinking and problem-solving…
Descriptors: Teaching Methods, Programming, Computer Science Education, Robotics
Peer reviewed Peer reviewed
Direct linkDirect link
Al-Sakkaf, Abdullah; Omar, Mazni; Ahmad, Mazida – Computer Science Education, 2019
Background and Context: In spite of the decades spent developing software visualization (SV), doubts still remain regarding their effectiveness. Furthermore, student engagement plays an important role in improving SV effectiveness as it is correlated with many positive academic outcomes. It has been shown that the existing SV has failed to engage…
Descriptors: Learner Engagement, Computer Software, Outcomes of Education, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Fridge, Evorell; Bagui, Sikha – International Journal of Information and Communication Technology Education, 2016
The goal of this research was to investigate the effects of automated testing software on levels of student reflection and student performance. This was a self-selecting, between subjects design that examined the performance of students in introductory computer programming classes. Participants were given the option of using the Web-CAT…
Descriptors: Computer Assisted Testing, Computer Software, Computer Software Evaluation, Reflection
Peer reviewed Peer reviewed
Direct linkDirect link
Kolling, Michael; McKay, Fraser – ACM Transactions on Computing Education, 2016
The past few years has seen a proliferation of novice programming tools. The availability of a large number of systems has made it difficult for many users to choose among them. Even for education researchers, comparing the relative quality of these tools, or judging their respective suitability for a given context, is hard in many instances. For…
Descriptors: Heuristics, Programming, Programming Languages, Computer Software
Mota, José Miguel; Ruiz-Rube, Iván; Dodero, Juan Manuel; Figueiredo, Mauro – International Association for Development of the Information Society, 2016
Augmented Reality (AR) technology allows the inclusion of virtual elements on a vision of actual physical environment for the creation of a mixed reality in real time. This kind of technology can be used in educational settings. However, the current AR authoring tools present several drawbacks, such as, the lack of a mechanism for tracking the…
Descriptors: Virtual Classrooms, Computer System Design, Computer Software Evaluation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Sherrard, Ann; Rhodes, Amy – Journal of Extension, 2014
The release of the latest LEGO Mindstorms EV3 robotics platform in September 2013 has provided a dilemma for many youth robotics leaders. There is a need to understand the differences in the Mindstorms NXT and EV3 in order to make future robotics purchases. In this article the differences are identified regarding software, hardware, sensors, the…
Descriptors: Robotics, Comparative Analysis, Consumer Economics, Purchasing
Zheng, Yongjie – ProQuest LLC, 2012
Software architecture plays an increasingly important role in complex software development. Its further application, however, is challenged by the fact that software architecture, over time, is often found not conformant to its implementation. This is usually caused by frequent development changes made to both artifacts. Against this background,…
Descriptors: Client Server Architecture, Computer Software, Programming, Computer Software Evaluation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Uysal, Murat Pasa – Turkish Online Journal of Distance Education, 2012
Developments in computer and information technologies continue to give opportunities for designing advanced E-learning systems while entailing objective and technical evaluation methodologies. Design and development of E-learning systems require time-consuming and labor-intensive processes; therefore any decision about these systems and their…
Descriptors: Educational Technology, Information Technology, Computer System Design, Decision Support Systems
Seyed, Ali Patrice – ProQuest LLC, 2012
The Open Biomedical Ontology (OBO) Foundry initiative is a collaborative effort for developing interoperable, science-based ontologies. The Basic Formal Ontology (BFO) serves as the upper ontology for the domain-level ontologies of OBO. BFO is an upper ontology of types as conceived by defenders of realism. Among the ontologies developed for OBO…
Descriptors: Evaluation Criteria, Computer Software, Expertise, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Alsubait, Tahani; Parsia, Bijan; Sattler, Uli – Research in Learning Technology, 2012
Different computational models for generating analogies of the form "A is to B as C is to D" have been proposed over the past 35 years. However, analogy generation is a challenging problem that requires further research. In this article, we present a new approach for generating analogies in Multiple Choice Question (MCQ) format that can be used…
Descriptors: Computer Assisted Testing, Programming, Computer Software, Computer Software Evaluation
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8