Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Networks | 25 |
Computer Science | 25 |
Information Technology | 25 |
Telecommunications | 14 |
Computer System Design | 12 |
Information Networks | 12 |
Computer Oriented Programs | 11 |
Data Processing | 11 |
Computer Peripherals | 9 |
Computer Security | 7 |
Internet | 5 |
More ▼ |
Source
Author
Amin, Rohan Mahesh | 1 |
Atkins, D. E. | 1 |
Bhagyavati | 1 |
Blake, Cecil | 1 |
Bowman, Michael | 1 |
Cerf, Vinton G. | 1 |
Crowcroft, Jon | 1 |
Dertouzos, Michael L. | 1 |
Dixit, R. K. | 1 |
Gore, Al | 1 |
Goulden, Murray | 1 |
More ▼ |
Publication Type
Journal Articles | 18 |
Opinion Papers | 10 |
Reports - Descriptive | 6 |
Dissertations/Theses -… | 4 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Collected Works - Serial | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Elementary Secondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 2 |
Location
Spain | 2 |
United Kingdom | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
California | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Goulden, Murray; Greiffenhagen, Christian; Crowcroft, Jon; McAuley, Derek; Mortier, Richard; Radenkovic, Milena; Sathiaseelan, Arjuna – International Journal of Social Research Methodology, 2017
Drawing on the experiences of a novel collaborative project between sociologists and computer scientists, this paper identifies a set of challenges for fieldwork that are generated by this "wild interdisciplinarity. Public Access Wi-Fi Service" was a project funded by an 'in-the-wild' research programme, involving the study of digital…
Descriptors: Ethnography, Computer Science, Interdisciplinary Approach, Sociology
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Rider, Andrew Kent – ProQuest LLC, 2013
Data in many growing fields has an underlying network structure that can be taken advantage of. In this dissertation we apply data and network science to problems in the domains of systems biology and healthcare. Data challenges in these fields include noisy, heterogeneous data, and a lack of ground truth. The primary thesis of this work is that…
Descriptors: Computer Networks, Computer Science, Biological Sciences, Health Sciences
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Rice, George; Bowman, Michael – Journal of Information Technology Education, 2007
Children in the back seat on a long trip are not the only ones asking the question "Are we there yet?" At Murray State University (MSU) and other universities starting new programs, the question becomes one of validation of the program. In the late 90s, MSU, a midsize university, was entrusted with the responsibility of developing a program of…
Descriptors: Information Systems, Computers, Information Technology, Computer Science
Waters, John K. – T.H.E. Journal, 2008
Teachers at Irvington High School in Fremont, California are looking for meaningful and relevant connections between what students are learning in the classroom and the job skills companies are looking for in the years to come. For Irvington, a Bay Area public high school serving about 2,000 students, that pursuit of a "logical link" led…
Descriptors: High Schools, Computer Science, Job Skills, Education Work Relationship
Grubb, Ralph E.; Pryzdial, Edward F. – Engineering Education, 1986
Describes the facilities and major networks of IBM's Corporate Technical Institute state-of-the-art residential campus at Thornwood, New York. Explains the operations and components of its information transport system and the capabilities of its cabling system. (ML)
Descriptors: Computer Networks, Computer Science, Computer Uses in Education, Educational Facilities
Atkins, D. E.; Olsen, Leslie A. – Engineering Education, 1986
Presents an overview of the Computer-Aided Engineering Network (CAEN) of the University of Michigan. Describes its arrangement of workstations, communication networks, and servers. Outlines the factors considered in hardware and software decision making. Reviews the program's impact on students. (ML)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Science, Computer Uses in Education
Weiser, Mark – Scientific American, 1991
Described are some of the ways in which computers can enter invisibly into people's lives. The social issues that embodied virtuality will engender are discussed. The hardware and software, connected by wires, radio waves, and infrared that will allow this to occur are described. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Negroponte, Nicholas P. – Scientific American, 1991
Creative applications of computer networks are discussed. Products and services of the future that come from imaginative applications of both channel and computing capacity are described. The topics of entertainment, transactions, and electronic personal surrogates are included. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Previous Page | Next Page ยป
Pages: 1 | 2