NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sandra McKeown; Zuhaib M. Mir – Research Synthesis Methods, 2024
Searching multiple resources to locate eligible studies for research syntheses can result in hundreds to thousands of duplicate references that should be removed before the screening process for efficiency. Research investigating the performance of automated methods for deduplicating references via reference managers and systematic review software…
Descriptors: Literature Reviews, Evaluation, Followup Studies, Automation
Abdulrahman Alshammari – ProQuest LLC, 2024
A critical component of modern software development practices, particularly continuous integration (CI), is the halt of development activities in response to test failures which requires further investigation and debugging. As software changes, regression testing becomes vital to verify that new code does not affect existing functionality.…
Descriptors: Computer Software, Programming, Coding, Test Reliability
Peer reviewed Peer reviewed
Direct linkDirect link
Hanan Khalil; Danielle Pollock; Patricia McInerney; Catrin Evans; Erica B. Moraes; Christina M. Godfrey; Lyndsay Alexander; Andrea Tricco; Micah D. J. Peters; Dawid Pieper; Ashrita Saran; Daniel Ameen; Petek Eylul Taneri; Zachary Munn – Research Synthesis Methods, 2024
Objective: This paper describes several automation tools and software that can be considered during evidence synthesis projects and provides guidance for their integration in the conduct of scoping reviews. Study Design and Setting: The guidance presented in this work is adapted from the results of a scoping review and consultations with the JBI…
Descriptors: Automation, Computer Software, Synthesis, Protocol Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Weisberg, Steven M.; Schinazi, Victor R.; Ferrario, Andrea; Newcombe, Nora S. – Journal of Experimental Psychology: Learning, Memory, and Cognition, 2023
Relying on shared tasks and stimuli to conduct research can enhance the replicability of findings and allow a community of researchers to collect large data sets across multiple experiments. This approach is particularly relevant for experiments in spatial navigation, which often require the development of unfamiliar large-scale virtual…
Descriptors: Programming, Error Patterns, Computer Simulation, Spatial Ability
Peer reviewed Peer reviewed
Direct linkDirect link
Lakshminarayanan, Srinivasan; Rao, N. J. – Higher Education for the Future, 2022
There are many grey areas in the interpretation of academic integrity in the course on Introduction to Programming, commonly known as CS1. Copying, for example, is a method of learning, a method of cheating and a reuse method in professional practice. Many institutions in India publish the code in the lab course manual. The students are expected…
Descriptors: Integrity, Cheating, Duplication, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Jakobs, Eva-Maria; Digmayer, Claas – AILA Review, 2020
This article examines how written feedback is used to support the production of texts for purposes of reuse. The case study refers to an entrepreneur training program at the University of Texas at Austin. In the program, Korean startups are trained in understanding the US market, and developing pitches that convince US investors. They are…
Descriptors: Feedback (Response), Case Studies, Entrepreneurship, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Konstantakis, Nikos I.; Palaigeorgiou, George E.; Siozos, Panos D.; Tsoukalas, Ioannis A. – Behaviour & Information Technology, 2010
Today, software piracy is an issue of global importance. Computer science students are the future information and communication technologies professionals and it is important to study the way they approach this issue. In this article, we attempt to study attitudes, behaviours and the corresponding reasoning of computer science students in Greece…
Descriptors: Copyrights, Antisocial Behavior, Crime, Duplication
Lipka, Sara – Chronicle of Higher Education, 2009
Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…
Descriptors: Music, Industry, Hearings, Copyrights