NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Baugh, Jeanne M. – Information Systems Education Journal, 2015
All Computer Information Systems programs require a database course for their majors. This paper describes an approach to such a course in which real world examples, both design projects and actual database application projects are incorporated throughout the semester. Students are expected to apply the traditional database concepts to actual…
Descriptors: Undergraduate Students, Computer Science Education, Information Systems, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Peer reviewed Peer reviewed
Direct linkDirect link
Qu, Changtao; Nejdl, Wolfgang – Educational Technology & Society, 2004
Edutella is an RDF-based E-Learning P2P network that is aimed to accommodate heterogeneous learning resource metadata repositories in a P2P manner and further facilitate the exchange of metadata between these repositories based on RDF. Whereas Edutella provides RDF metadata repositories with a quite natural integration approach, XML metadata…
Descriptors: Metadata, Educational Resources, Models, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Brase, Jan; Painter, Mark – Educational Technology & Society, 2004
Learning Objects Metadata (LOM) aims at describing educational resources in order to allow better reusability and retrieval. In this article we show how additional inference rules allows us to derive additional metadata from existing ones. Additionally, using these rules as integrity constraints helps us to define the constraints on LOM elements,…
Descriptors: Inferences, Metadata, Information Retrieval, Standards