NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 31 to 45 of 343 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sarkar, Nurul I. – International Journal of Web-Based Learning and Teaching Technologies, 2013
Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It…
Descriptors: Telecommunications, Computer Networks, Undergraduate Students, Learning Activities
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
He, Aiguo – International Journal of Distance Education Technologies, 2011
Computer system is useful for improving real time and interactive distance education activities. Especially in the case that a large number of students participate in one distance lecture together and every student uses their own computer to share teaching materials or control discussions over the virtual classrooms. The problem is that within…
Descriptors: Distance Education, Educational Technology, Guidance, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Huggard, Meriel; McGoldrick, Ciaran – Campus-Wide Information Systems, 2013
Purpose: The purpose of this study is to evaluate a practical laboratory task where final year undergraduate students design, implement and validate an inferred security wireless sensor access system. Design/methodology/approach: The quality of the learning and technical environment was evaluated from a number of perspectives using a mixed methods…
Descriptors: Telecommunications, Computer Networks, Electronic Equipment, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Ttofis, C.; Theocharides, T.; Michael, M. K. – IEEE Transactions on Education, 2012
Manycore systems have emerged as being one of the dominant architectural trends in next-generation computer systems. These highly parallel systems are expected to be interconnected via packet-based networks-on-chip (NoC). The complexity of such systems poses novel and exciting challenges in academia, as teaching their design requires the students…
Descriptors: Computer System Design, Computer Networks, Computer Science Education, Teaching Methods
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Chetty, Marshini – ProQuest LLC, 2011
Technological infrastructure is often taken for granted in our day to day lives until it breaks down, usually because it invisibly supports tasks otherwise. Previous work in HCI has focused on how people react and deal with breaks in infrastructure as well as how to help people to fix or exploit these breaks. However, few have sought to understand…
Descriptors: Computer Networks, Physical Environment, Family Environment, Computer System Design
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Dong, Hui – ProQuest LLC, 2010
In current Peer-to-Peer networks, distributed and semantic free indexing is widely used by systems adopting "Distributed Hash Table" ("DHT") mechanisms. Although such systems typically solve a. user query rather fast in a deterministic way, they only support a very narrow search scheme, namely the exact hash key match. Furthermore, DHT systems put…
Descriptors: Indexing, Online Searching, Search Strategies, Computer Networks
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Fang; Brabston, Mary – Journal of Information Systems Education, 2011
We implemented two local area network (LAN) projects in our introductory data communications and networking course. The first project required students to develop a LAN from scratch for a small imaginary organization. The second project required student groups to analyze a LAN for a real world small organization. By allowing students to apply what…
Descriptors: Computer Networks, Information Science Education, Information Networks, Theory Practice Relationship
Chudnov, Daniel – Computers in Libraries, 2010
Cloud computing is definitely a thing now, but it's not new and it's not even novel. Back when people were first learning about the Internet in the 1990s, every diagram that one saw showing how the Internet worked had a big cloud in the middle. That cloud represented the diverse links, routers, gateways, and protocols that passed traffic around in…
Descriptors: Internet, Computer System Design, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Marissa L.; Cline, Mark A. – Journal of Science Education and Technology, 2011
Radford University was recently configured with a campus-wide wireless local area network. Using these new capabilities, a classroom-based Honors section of Concepts of Biology was conducted solely using electronic technologies (paper was never transferred from professor to student). To accomplish this, students used common software and freeware.…
Descriptors: Biology, Instructional Effectiveness, Computer Software, Educational Technology
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  23