NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 46 to 60 of 343 results Save | Export
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Raths, David – Campus Technology, 2011
In this era of political rancor when everything is a zero-sum game, it is refreshing to think that two parties could actually come together to create a win-win situation. That is exactly what is happening, though, as a number of universities take on the role of application service provider (ASP) for smaller schools. It is not all confetti and…
Descriptors: Intercollegiate Cooperation, Partnerships in Education, Information Networks, Computer Networks
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Tu, Chih-Hsiung; Sujo-Montes, Laura; Yen, Cherng-Jyh; Chan, Junn-Yih; Blocher, Michael – TechTrends: Linking Research and Practice to Improve Learning, 2012
Learning management systems traditionally provide structures to guide online learners to achieve their learning goals. Web 2.0 technology empowers learners to create, share, and organize their personal learning environments in open network environments; and allows learners to engage in social networking and collaborating activities. Advanced…
Descriptors: Online Courses, Computer Assisted Instruction, Educational Technology, Course Descriptions
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Larney, Sarah; Burns, Lucy – Evaluation Review, 2011
Individuals in contact with the criminal justice system are a key population of concern to public health. Record linkage studies can be useful for studying health outcomes for this group, but the use of aliases complicates the process of linking records across databases. This study was undertaken to determine the impact of aliases on sensitivity…
Descriptors: Criminals, Public Health, Justice, Institutionalized Persons
Yan, Gongjun – ProQuest LLC, 2010
Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…
Descriptors: Confidentiality, Electronic Equipment, Geographic Location, Probability
Peer reviewed Peer reviewed
Direct linkDirect link
Klemke, Roland; Ternier, Stefaan; Kalz, Marco; Specht, Marcus – British Journal of Educational Technology, 2010
Making learning objects available is critical to reuse learning resources. Making content transparently available and providing added value to different stakeholders is among the goals of the European Commission's eContentplus programme. This paper analyses standards and protocols relevant for making learning objects accessible in distributed data…
Descriptors: Foreign Countries, Metadata, Educational Resources, Computer Networks
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Demski, Jennifer – Campus Technology, 2010
As higher education budgets tighten in the ongoing recession, colleges and universities have found themselves questioning, lengthening, and even eliminating tech refresh cycles. Yet how deep an institution cuts into its refresh program can compromise its ability to provide an up-to-date and competitive computing environment for students and a…
Descriptors: Educational Technology, Cost Effectiveness, Information Networks, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Demirkan, Haluk; Goul, Michael; Gros, Mary – Decision Sciences Journal of Innovative Education, 2010
Many e-learning service systems fail. This is particularly true for those sponsored by joint industry/university consortia where substantial economic investments are required up-front. This article provides an industry/university consortia reference model validated through experiences with the 8-year-old Teradata University Network. The reference…
Descriptors: Sustainability, Electronic Learning, School Business Relationship, Consortia
Peer reviewed Peer reviewed
Direct linkDirect link
Cobb, Chris – Perspectives: Policy and Practice in Higher Education, 2012
Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…
Descriptors: Management Information Systems, Foreign Countries, Computer Interfaces, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
O'Reilly, Meg; Lefoe, Gerry; Philip, Robyn; Parrish, Dominique – International Journal on E-Learning, 2010
The Australasian Society for Computers in Learning in Tertiary Education ("ascilite") has recently completed research to inform development of the ALTC Exchange, a new online service for learning and teaching in Australia. The research investigated resource identification and contribution, engagement with the repository and user…
Descriptors: User Needs (Information), Higher Education, Foreign Countries, Shared Resources and Services
Huang, Kuo Hung, Ed. – InTech, 2011
Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…
Descriptors: Computer Networks, Publishing Industry, Electronic Libraries, Educational Resources
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  23