Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 39 |
Descriptor
| Computer System Design | 52 |
| Information Technology | 52 |
| Computer Science Education | 35 |
| Computer Software | 27 |
| Computer Science | 20 |
| Programming | 19 |
| Foreign Countries | 16 |
| Computer Networks | 15 |
| Instructional Design | 12 |
| College Instruction | 11 |
| Computer Peripherals | 11 |
| More ▼ | |
Source
Author
| Agee, Kelly, Ed. | 1 |
| Amin, Rohan Mahesh | 1 |
| Anas Jebreen Atyeh Husain | 1 |
| Arfaee, A. | 1 |
| Ballenger, Robert M. | 1 |
| Beishuizen, Jos | 1 |
| Benson, B. | 1 |
| Budimac, Zoran | 1 |
| Campbell, Jackie | 1 |
| Capra, Eliane | 1 |
| Cerf, Vinton G. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 40 |
| Reports - Descriptive | 17 |
| Dissertations/Theses -… | 9 |
| Opinion Papers | 9 |
| Reports - Research | 9 |
| Reports - Evaluative | 7 |
| Collected Works - Proceedings | 1 |
| Information Analyses | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 31 |
| Postsecondary Education | 26 |
| Adult Education | 2 |
| Elementary Secondary Education | 2 |
| Secondary Education | 2 |
| High Schools | 1 |
Location
| United Kingdom | 4 |
| Australia | 1 |
| Brazil | 1 |
| California | 1 |
| Georgia | 1 |
| Germany | 1 |
| Greece | 1 |
| Japan | 1 |
| Jordan | 1 |
| Mississippi | 1 |
| Netherlands | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Carl D Perkins Vocational and… | 1 |
| No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
What Works Clearinghouse Rating
Mohammed Ahmed Kofahi; Anas Jebreen Atyeh Husain – Journal of Information Technology Education: Research, 2025
Aim/Purpose: In this study, we propose an AI technology-based learning model using ChatGPT and investigate its effect on students' higher-order thinking (HOT) ability in an operating systems (OS) course. Background: A critical requirement for IT and engineering students is supporting them in understanding advanced OS concepts and fostering their…
Descriptors: Artificial Intelligence, Computer Science Education, Thinking Skills, Computer System Design
Loh, Matthew – ProQuest LLC, 2013
The scalability of CMOS technology has driven computation into a diverse range of applications across the power consumption, performance and size spectra. Communication is a necessary adjunct to computation, and whether this is to push data from node-to-node in a high-performance computing cluster or from the receiver of wireless link to a neural…
Descriptors: Power Technology, Scaling, Computer Science, Computation
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Shoufan, Abdulhadi; Huss, Sorin A. – ACM Transactions on Computing Education, 2010
Reconfigurable computing is an established field in computer science. Teaching this field to computer science students demands special attention due to limited student experience in electronics and digital system design. This article presents a compact course on reconfigurable processors, which was offered at the Technische Universitat Darmstadt,…
Descriptors: Computer Science, Student Experience, Courses, Faculty Development
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Exter, Marisa; Turnage, Nichole – ACM Transactions on Computing Education, 2012
This exploratory qualitative study examines computing professional's memories of their own formal and non-formal educational experiences, their reflections on how these have prepared them for their professional roles, and their recommendations for an "ideal" undergraduate degree program. Data was collected through semi-structured interviews of…
Descriptors: Qualitative Research, Grounded Theory, Data Analysis, Questionnaires
Wagner, William P.; Pant, Vik – Journal of Information Systems Education, 2010
One of the areas where demand has remained strong for MIS students is in the area of database management. Since the early days, this topic has been a mainstay in the MIS curriculum. Students of database management today typically learn about relational databases, SQL, normalization, and how to design and implement various kinds of database…
Descriptors: College Instruction, Computer Science Education, Information Technology, Business Administration Education
Golden, Elspeth – ProQuest LLC, 2010
In spite of the goodwill and best efforts of software engineers and usability professionals, systems continue to be built and released with glaring usability flaws that are costly and difficult to fix after the system has been built. Although user interface (UI) designers, be they usability or design experts, communicate usability requirements to…
Descriptors: Computer Software, Computer Interfaces, Computer System Design, Usability
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Kostaras, N.; Xenos, M.; Skodras, A. N. – IEEE Transactions on Education, 2011
This paper presents the usability evaluation of a digital systems laboratory class offered to distance-learning students. It details the way in which students can participate remotely in such a laboratory, the methodology employed in the usability assessment of the laboratory infrastructure (hardware and software), and also outlines the main…
Descriptors: Foreign Countries, Educational Quality, Laboratories, Pilot Projects
Goel, Sanjay; Kathuria, Vanshi – Journal of Information Technology Education, 2010
The majority of an engineer's time in the software industry is spent working with other programmers. Agile methods of software development like eXtreme Programming strongly rely upon practices like daily meetings and pair programming. Hence, the need to learn the skill of working collaboratively is of primary importance for software developers.…
Descriptors: Computer Science Education, Programming, Teaching Methods, Introductory Courses
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning

Peer reviewed
Direct link
