Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Science Education | 4 |
Computer System Design | 4 |
Metadata | 4 |
Programming | 3 |
Access to Information | 2 |
Classification | 2 |
College Instruction | 2 |
Computer Software | 2 |
Computer Software Evaluation | 2 |
Educational Resources | 2 |
Information Retrieval | 2 |
More ▼ |
Author
Abel, Marie-Helene | 1 |
Amin, Rohan Mahesh | 1 |
Barry, Catherine | 1 |
Benayache, Ahcene | 1 |
Botturi, Luca | 1 |
Chaput, Brigitte | 1 |
Derntl, Michael | 1 |
Lenne, Dominique | 1 |
Miller, L. D. | 1 |
Moulin, Claude | 1 |
Nugent, Gwen | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
France | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Derntl, Michael; Botturi, Luca – Computer Science Education, 2006
Coming from architecture, through computer science, pattern-based design spread into other disciplines and is nowadays recognized as a powerful way of capturing and reusing effective design practice. However, current pedagogical pattern approaches lack widespread adoption, both by users and authors, and are still limited to individual initiatives.…
Descriptors: Computer System Design, Computer Science Education, Design Requirements, Scientific Concepts
Abel, Marie-Helene; Benayache, Ahcene; Lenne, Dominique; Moulin, Claude; Barry, Catherine; Chaput, Brigitte – Educational Technology & Society, 2004
E-learning leads to evolutions in the way of designing a course. Diffused through the web, the course content cannot be the direct transcription of a face to face course content. A course can be seen as an organization in which different actors are involved. These actors produce documents, information and knowledge that they often share. We…
Descriptors: Course Content, Internet, College Instruction, Models