NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 128 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Amanda Konet; Ian Thomas; Gerald Gartlehner; Leila Kahwati; Rainer Hilscher; Shannon Kugley; Karen Crotty; Meera Viswanathan; Robert Chew – Research Synthesis Methods, 2024
Accurate data extraction is a key component of evidence synthesis and critical to valid results. The advent of publicly available large language models (LLMs) has generated interest in these tools for evidence synthesis and created uncertainty about the choice of LLM. We compare the performance of two widely available LLMs (Claude 2 and GPT-4) for…
Descriptors: Data Collection, Artificial Intelligence, Computer Software, Computer System Design
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Mohammed Ahmed Kofahi; Anas Jebreen Atyeh Husain – Journal of Information Technology Education: Research, 2025
Aim/Purpose: In this study, we propose an AI technology-based learning model using ChatGPT and investigate its effect on students' higher-order thinking (HOT) ability in an operating systems (OS) course. Background: A critical requirement for IT and engineering students is supporting them in understanding advanced OS concepts and fostering their…
Descriptors: Artificial Intelligence, Computer Science Education, Thinking Skills, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Maria R. Ebling – ACM Transactions on Computing Education, 2024
Objectives: Faculty new to teaching operating systems or those looking to refresh their course need to understand the state of the art in operating system education. Toward this goal, we conducted a survey of operating system instructors to understand how they approach teaching the course and what textbook and software platforms they use in their…
Descriptors: Literature Reviews, Surveys, Teacher Attitudes, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Alsadoon, Abeer; Prasad, P. W. C.; Beg, Azam – European Journal of Engineering Education, 2017
Making the students understand the theoretical concepts of digital logic design concepts is one of the major issues faced by the academics, therefore the teachers have tried different techniques to link the theoretical information to the practical knowledge. Use of software simulations is a technique for learning and practice that can be applied…
Descriptors: Computer Software, Information Technology, Computer Simulation, Student Surveys
Kramer, Aleksey – ProQuest LLC, 2013
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
Descriptors: Computer Software, Computer Security, Information Technology, Demography
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
Kharabe, Amol T. – ProQuest LLC, 2012
Over the last two decades, firms have operated in "increasingly" accelerated "high-velocity" dynamic markets, which require them to become "agile." During the same time frame, firms have increasingly deployed complex enterprise systems--large-scale packaged software "innovations" that integrate and automate…
Descriptors: Computer Software, Computer System Design, Innovation, Organizational Effectiveness
Seyed, Ali Patrice – ProQuest LLC, 2012
The Open Biomedical Ontology (OBO) Foundry initiative is a collaborative effort for developing interoperable, science-based ontologies. The Basic Formal Ontology (BFO) serves as the upper ontology for the domain-level ontologies of OBO. BFO is an upper ontology of types as conceived by defenders of realism. Among the ontologies developed for OBO…
Descriptors: Evaluation Criteria, Computer Software, Expertise, Programming
Harrell, J. Michael – ProQuest LLC, 2011
Enterprise architecture is a relatively new concept that arose in the latter half of the twentieth century as a means of managing the information technology resources within the enterprise. Borrowing from the disciplines of brick and mortar architecture, software engineering, software architecture, and systems engineering, the enterprise…
Descriptors: Information Technology, Case Studies, Computer Software, Business Administration
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Filipowski, Tomasz; Kazienko, Przemyslaw; Brodka, Piotr; Kajdanowicz, Tomasz – Behaviour & Information Technology, 2012
Knowledge exchange between employees is an essential feature of recent commercial organisations on the competitive market. Based on the data gathered by various information technology (IT) systems, social links can be extracted and exploited in knowledge exchange systems of a new kind. Users of such a system ask their queries and the system…
Descriptors: Expertise, Informal Education, Information Technology, Workplace Learning
Boxwell, Stephen A. – ProQuest LLC, 2011
Treebanks are a necessary prerequisite for many NLP tasks, including, but not limited to, semantic role labeling. For many languages, however, treebanks are either nonexistent or too small to be useful. Time-critical applications may require rapid deployment of natural language software for a new critical language--much faster than the development…
Descriptors: Natural Language Processing, Training, Programming, Computer System Design
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Kim, Jaewook – ProQuest LLC, 2011
One of the most critical steps to integrating heterogeneous e-Business applications using different XML schemas is schema matching, which is known to be costly and error-prone. Many automatic schema matching approaches have been proposed, but the challenge is still daunting because of the complexity of schemas and immaturity of technologies in…
Descriptors: Information Technology, Information Retrieval, Programming Languages, Programming
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9