Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Networks | 12 |
Computer Science Education | 12 |
Computer System Design | 12 |
Information Technology | 5 |
Foreign Countries | 4 |
Teaching Methods | 4 |
Advanced Courses | 3 |
College Instruction | 3 |
Computer Security | 3 |
Computer Software | 3 |
Computers | 3 |
More ▼ |
Source
IEEE Transactions on Education | 3 |
ProQuest LLC | 2 |
Campus-Wide Information… | 1 |
Interactive Learning… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Research and Curriculum Unit | 1 |
Techniques: Connecting… | 1 |
Author
Agee, Kelly, Ed. | 1 |
Amin, Rohan Mahesh | 1 |
Christen, Amy | 1 |
Copeland, J. A. | 1 |
Domingue, John | 1 |
Fairbanks, K. D. | 1 |
Grivas, Michael | 1 |
Gómez-Goiri, Aitor | 1 |
Kehagias, Dimitris | 1 |
Kemppainen, Jyri | 1 |
Lee, C. P. | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 7 |
Dissertations/Theses -… | 2 |
Reports - Evaluative | 2 |
Legal/Legislative/Regulatory… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Secondary Education | 2 |
Adult Education | 1 |
Audience
Policymakers | 1 |
Practitioners | 1 |
Researchers | 1 |
Laws, Policies, & Programs
Carl D Perkins Vocational and… | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Mikroyannidis, Alexander; Gómez-Goiri, Aitor; Smith, Andrew; Domingue, John – Interactive Learning Environments, 2020
The main challenges commonly associated with acquiring practical network engineering skills are the requirements for access to specialised and up-to-date network equipment, as well as the high costs associated with obtaining and maintaining this equipment. The PT Anywhere initiative addresses these challenges by offering a mobile environment for…
Descriptors: Computer Science Education, Computer Networks, Data Analysis, Engineering
Ttofis, C.; Theocharides, T.; Michael, M. K. – IEEE Transactions on Education, 2012
Manycore systems have emerged as being one of the dominant architectural trends in next-generation computer systems. These highly parallel systems are expected to be interconnected via packet-based networks-on-chip (NoC). The complexity of such systems poses novel and exciting challenges in academia, as teaching their design requires the students…
Descriptors: Computer System Design, Computer Networks, Computer Science Education, Teaching Methods
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Sundresh, Sameer – ProQuest LLC, 2009
How do you dynamically customize the programming language available in a context within an existing system, without changing the underlying system? This dissertation introduces a language design approach that addresses this problem. The basic idea is to structure programs as systems of multiple interacting levels of abstraction, where all of the…
Descriptors: Programming Languages, Programming, Internet, Computer System Design
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Kemppainen, Jyri; Tedre, Matti; Sutinen, Erkki – Journal of Information Technology Education: Research, 2012
Information technology (IT) professionals face markedly different kinds of challenges in developing countries from the ones in developed countries. Based on the research literature and our fourteen years of fieldwork in Iringa, Tanzania, we have identified eight groups of technical characteristics of IT work that significantly affect the work of…
Descriptors: Foreign Countries, Developing Nations, Engineering Education, Work Environment
Christen, Amy – Techniques: Connecting Education and Careers (J1), 2009
Today's hyper-connected students live in a world of instant interpersonal communications and virtually infinite access to information and educational resources. But this networked world, and the powerful learning tools it offers, has yet to penetrate the typical classroom. In many ways educational institutions are spinning their curricular wheels,…
Descriptors: Educational Technology, Partnerships in Education, School Business Relationship, Program Descriptions
Agee, Kelly, Ed. – Research and Curriculum Unit, 2009
Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…
Descriptors: Information Technology, Educational Technology, Teaching Methods, Computer Science Education
Kehagias, Dimitris; Grivas, Michael; Mamalis, Basilis; Pantziou, Grammati – Campus-Wide Information Systems, 2006
Purpose: The purpose of this paper is to evaluate the use of a non-expensive dynamic computing resource, consisting of a Beowulf class cluster and a NoW, as an educational and research infrastructure. Design/methodology/approach: Clusters, built using commodity-off-the-shelf (COTS) hardware components and free, or commonly used, software, provide…
Descriptors: Information Systems, Systems Development, Computer System Design, Computer Networks
Congress of the U.S., Washington, DC. Senate Committee on Commerce, Science, and Transportation. – 1990
This committee report is intended to accompany S. 1067, a bill designed to provide for a coordinated federal research program in high-performance computing (HPC). The primary objective of the legislation is given as the acceleration of research, development, and application of the most advanced computing technology in research, education, and…
Descriptors: Computer Networks, Computer Science Education, Computer Software Development, Computer System Design