Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 26 |
Descriptor
Computer Software Evaluation | 33 |
Computer System Design | 33 |
Information Technology | 33 |
Computer Software | 20 |
Educational Technology | 12 |
Foreign Countries | 11 |
Programming | 11 |
Evaluation Methods | 9 |
Computer Assisted Instruction | 8 |
Instructional Design | 8 |
Electronic Learning | 7 |
More ▼ |
Source
Author
Yang, Yu-Fen | 2 |
Almeroth, Kevin | 1 |
Alodhaibi, Khalid | 1 |
Amin, Rohan Mahesh | 1 |
Bao, Zhen | 1 |
Beishuizen, Jos | 1 |
Capra, Eliane | 1 |
Cechinel, Cristian | 1 |
Chan, Lawrence | 1 |
Chen, Chun-Hua | 1 |
Chen, Hong-Xin | 1 |
More ▼ |
Publication Type
Journal Articles | 20 |
Reports - Evaluative | 11 |
Reports - Research | 9 |
Dissertations/Theses -… | 7 |
Reports - Descriptive | 5 |
Speeches/Meeting Papers | 4 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 12 |
Postsecondary Education | 10 |
Elementary Secondary Education | 4 |
Adult Education | 2 |
Audience
Teachers | 2 |
Administrators | 1 |
Practitioners | 1 |
Location
Taiwan | 3 |
Greece | 2 |
Lithuania | 2 |
Australia | 1 |
Bulgaria | 1 |
California | 1 |
Croatia | 1 |
Cyprus | 1 |
Germany | 1 |
Latvia | 1 |
Malaysia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Seyed, Ali Patrice – ProQuest LLC, 2012
The Open Biomedical Ontology (OBO) Foundry initiative is a collaborative effort for developing interoperable, science-based ontologies. The Basic Formal Ontology (BFO) serves as the upper ontology for the domain-level ontologies of OBO. BFO is an upper ontology of types as conceived by defenders of realism. Among the ontologies developed for OBO…
Descriptors: Evaluation Criteria, Computer Software, Expertise, Programming
Alodhaibi, Khalid – ProQuest LLC, 2011
Recommender systems aim to support users in their decision-making process while interacting with large information spaces and recommend items of interest to users based on preferences they have expressed, either explicitly or implicitly. Recommender systems are increasingly used with product and service selection over the Internet. Although…
Descriptors: Information Processing, Decision Support Systems, Decision Making, Preferences
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Uysal, Murat Pasa – Turkish Online Journal of Distance Education, 2012
Developments in computer and information technologies continue to give opportunities for designing advanced E-learning systems while entailing objective and technical evaluation methodologies. Design and development of E-learning systems require time-consuming and labor-intensive processes; therefore any decision about these systems and their…
Descriptors: Educational Technology, Information Technology, Computer System Design, Decision Support Systems
Cechinel, Cristian; Sanchez-Alonso, Salvador; Garcia-Barriocanal, Elena – Computers & Education, 2011
The continuously growth of learning resources available in on-line repositories has raised the concern for the development of automated methods for quality assessment. The current existence of on-line evaluations in such repositories has opened the possibility of searching for statistical profiles of highly-rated resources that can be used as…
Descriptors: Discriminant Analysis, Educational Resources, Classification, Automation
Kostaras, N.; Xenos, M.; Skodras, A. N. – IEEE Transactions on Education, 2011
This paper presents the usability evaluation of a digital systems laboratory class offered to distance-learning students. It details the way in which students can participate remotely in such a laboratory, the methodology employed in the usability assessment of the laboratory infrastructure (hardware and software), and also outlines the main…
Descriptors: Foreign Countries, Educational Quality, Laboratories, Pilot Projects
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Nordin, Norazah; Ibrahim, Sham; Mohd. Hamzah, Mohd. Izham; Embi, Mohamed Amin; Din, Rosseni – Turkish Online Journal of Educational Technology - TOJET, 2012
The development in information technology has now moved from the first wave that emphasises on computer technical skills to the second wave which focuses on the application and management aspects. This paper aims to investigate the use of learning management system among future school heads in education management and leadership. The study was…
Descriptors: Educational Technology, Information Technology, Leadership, Learning Strategies
Jabba Molinares, Daladier – ProQuest LLC, 2009
Communication underwater is challenging because of the inherent characteristics of the media. First, common radio frequency (RF) signals utilized in wireless communications cannot be used under water. RF signals are attenuated in such as way that RF communication underwater is restricted to very few meters. As a result, acoustic-based…
Descriptors: Acoustics, Internet, Telecommunications, Information Technology
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Yares, Ali Chava Kaufman – ProQuest LLC, 2010
Information is everywhere and finding the best method to manage it is a problem that all types of organizations have to deal with. Schools use Student Information Systems (SIS) to manage Student Data, Financial Information, Development, Human Resources, Admission, Financial Aid, Enrollment, Scheduling, and Health Information. A survey of 107…
Descriptors: Private Schools, Education, Information Systems, Databases
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Penedo, Janaina Rodrigues; Diniz, Morganna; Ferreira, Simone Bacellar Leal; Silveira, Denis S.; Capra, Eliane – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to analyze the usability of a remote learning system in its initial development phase, using a quantitative usability evaluation method through Markov models. Design/methodology/approach: The paper opted for an exploratory study. The data of interest of the research correspond to the possible accesses of users…
Descriptors: Markov Processes, Evaluation Methods, Probability, Evaluation Research
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Shih, Wen-Chung; Tseng, Shian-Shyong; Yang, Chao-Tung – Computers & Education, 2008
Grid computing environments with abundant resources can support innovative e-Learning applications, and are promising platforms for e-Learning. To support individualized and adaptive learning, teachers are encouraged to develop various teaching materials according to different requirements. However, traditional methodologies for designing teaching…
Descriptors: Teacher Developed Materials, Material Development, Educational Technology, Computer Software