NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)11
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Sun, Chong – ProQuest LLC, 2012
More and more information is being generated in text documents, such as Web pages, emails and blogs. To effectively manage this unstructured information, one broadly used approach includes locating relevant content in documents, extracting structured information and integrating the extracted information for querying, mining or further analysis. In…
Descriptors: Information Management, Computer Science, Information Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Karamete, Aysen – Educational Research and Reviews, 2015
This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…
Descriptors: Computer Science, Educational Technology, Student Teacher Attitudes, Reliability
Peer reviewed Peer reviewed
Direct linkDirect link
Ziwisky, Michael; Persohn, Kyle; Brylow, Dennis – ACM Transactions on Computing Education, 2013
We present "Xipx," the first port of a major educational operating system to a processor in the emerging class of many-core architectures. Through extensions to the proven Embedded Xinu operating system, Xipx gives students hands-on experience with system programming in a distributed message-passing environment. We expose the software primitives…
Descriptors: Computer Software, Technology Uses in Education, Information Management, Computer Science
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Dragut, Eduard Constantin – ProQuest LLC, 2010
An increasing number of Web sites expose their content via query interfaces, many of them offering the same type of products/services (e.g., flight tickets, car rental/purchasing). They constitute the so-called "Deep Web". Accessing the content on the Deep Web has been a long-standing challenge for the database community. For a user interested in…
Descriptors: Internet, Web Sites, Search Engines, Information Retrieval
Hasan, Ragib – ProQuest LLC, 2009
In today's world, information is increasingly created, processed, transmitted, and stored digitally. While the digital nature of information has brought enormous benefits, it has also created new vulnerabilities and attacks against data. Unlike physical documents, digitally stored information can be rapidly copied, erased, or modified. The…
Descriptors: Archives, Court Litigation, Information Management, Information Storage
Mei, Qiaozhu – ProQuest LLC, 2009
With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual information. Those contexts can be explicit, such as the time and the location where a blog article is written, and the…
Descriptors: Information Retrieval, Data Processing, Language Patterns, Pattern Recognition
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Jurisica, Igor; Mylopoulos, John; Yu, Eric – Proceedings of the ASIS Annual Meeting, 1999
Surveys some of the basic concepts that have been used in computer science for the representation of knowledge and summarizes some of their advantages and drawbacks. Relates these techniques to information sciences theory and practice. Concepts are classified in four broad ontological categories: static ontology, dynamic ontology, intentional…
Descriptors: Classification, Computer Science, Information Industry, Information Management
Ng, Kwong Bor; Park, Soyeon; Burnett, Kathleen – Proceedings of the ASIS Annual Meeting, 1997
Examines the different concepts and orientations of the two major approaches to the role of metadata in the digital library (library science-oriented bibliographic control and computer science-oriented data management), and proposes an integrated concept of metadata to facilitate the merging of these two approaches. Discusses ongoing efforts to…
Descriptors: Bibliographic Databases, Cataloging, Computer Science, Electronic Libraries
Peer reviewed Peer reviewed
Burnett, Kathleen; Ng, Kwong Bor; Park, Soyeon – Journal of the American Society for Information Science, 1999
Describes different conceptual foundations and orientations of the two major approaches to metadata: bibliographic-control approach (origins and major proponents in library science); and data-management approach (origins and major proponents in computer science). Examination of efforts to establish metadata standards and comparison of different…
Descriptors: Access to Information, Cataloging, Comparative Analysis, Computer Science
Blake, Cecil – 1991
This paper discusses current information technologies and their applications, both real and potential, in the field of public relations. It is argued that public relations are more important than ever in view of global events that challenge the world's ability to handle problems related to public trust and confidence, and the telecommunications…
Descriptors: Computer Networks, Computer Science, Databases, Developing Nations
Peer reviewed Peer reviewed
Direct linkDirect link
Fischer, Frank; Troendle, Pamela; Mandl, Heinz – Interactive Learning Environments, 2003
Up to this point, university education has largely remained unaffected by the developments of novel approaches to web-based learning. The paper presents a principled approach to the design of problem-oriented, web-based learning at the university level. The principles include providing authentic contexts with multimedia, supporting collaborative…
Descriptors: Internet, Computer Science, Computer Assisted Instruction, Computer Software
Previous Page | Next Page ยป
Pages: 1  |  2