Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 13 |
| Since 2017 (last 10 years) | 18 |
| Since 2007 (last 20 years) | 212 |
Descriptor
| Computer System Design | 463 |
| Information Technology | 463 |
| Computer Software | 128 |
| Educational Technology | 104 |
| Computer Networks | 87 |
| Foreign Countries | 87 |
| Internet | 87 |
| Information Systems | 83 |
| Higher Education | 75 |
| Computer Uses in Education | 65 |
| Programming | 62 |
| More ▼ | |
Source
Author
| Burmood, Jennifer, Comp. | 3 |
| Nixon, Carol, Comp. | 3 |
| Chen, Chun-Hua | 2 |
| Flaherty, William | 2 |
| Grush, Mary | 2 |
| Huang, Chenn-Jung | 2 |
| Lunin, Lois F. | 2 |
| Luo, Yun-Cheng | 2 |
| Lynch, Clifford A. | 2 |
| Marchionini, Gary | 2 |
| Smith, Peter, Ed. | 2 |
| More ▼ | |
Publication Type
Education Level
| Higher Education | 114 |
| Postsecondary Education | 68 |
| Elementary Secondary Education | 24 |
| Adult Education | 15 |
| Secondary Education | 8 |
| High Schools | 5 |
| Elementary Education | 2 |
Location
| United Kingdom | 9 |
| California | 8 |
| Taiwan | 7 |
| Pennsylvania | 6 |
| United States | 6 |
| Canada | 5 |
| India | 5 |
| Spain | 5 |
| Australia | 4 |
| Massachusetts | 4 |
| Germany | 3 |
| More ▼ | |
Laws, Policies, & Programs
| Americans with Disabilities… | 1 |
| Carl D Perkins Vocational and… | 1 |
| Health Insurance Portability… | 1 |
| No Child Left Behind Act 2001 | 1 |
| Telecommunications Act 1996 | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
| Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
Peer reviewedSun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewedDavison, Wayne – Library Hi Tech, 1990
Discusses how various Open Systems Interconnection (OSI) application layer protocols can be used together, along with the Presentation and Session protocols, to support the interconnection requirements of applications. Application layer protocol standards that are currently available or under development are reviewed, and the File, Transfer,…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Systems
Peer reviewedFincher, Judith A. – Library Hi Tech, 1990
The edi conceptual model is being developed to define common structures, services, and processes that syntax-specific standards like X12 and EDIFACT could adopt. Open Systems Interconnection (OSI) is of interest to edi because of its potential to help enable global interoperability across Electronic Data Interchange (EDI) functional groups. A…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Systems
Peer reviewedMills, Kevin L. – Library Hi Tech, 1990
Describes the emergence of Open Systems Interconnection (OSI) as it relates to the U.S. Government Open Systems Interconnection Profile (GOSIP); defines GOSIP; and speculates about its future. Challenges facing GOSIP that are related to test policies and procedures, strategic and tactical planning, additional functionality, and international…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Systems
Matey, John G. – School Business Affairs, 1990
Outlines a systematic approach for evaluating the needs and potential problems involved when school districts seek to update their current information systems. Considers the following components: financial, technical, computer literacy, and information system management infrastructure. (MLF)
Descriptors: Computer Literacy, Computer System Design, Computer Uses in Education, Elementary Secondary Education
Peer reviewedAllen, Bryce L. – Annual Review of Information Science and Technology, 1991
Reviews cognitive research and the design of information systems based on cognitive research that has appeared in the information science literature since 1985 and that is primarily user oriented. Topics discussed include various types of knowledge and cognitive models, general and specific cognitive processes, cognitive abilities, and cognitive…
Descriptors: Cognitive Ability, Cognitive Processes, Cognitive Style, Computer System Design
Peer reviewedLynch, Clifford A. – Journal of the American Society for Information Science, 1991
Explains the technologies of electronic imaging as background for other articles in this section, focusing on technologies seen by the developer or user of electronic imaging applications. Topics discussed include image acquisition, storage, retrieval, compression, transmission, display, manipulation, and printing; standards and architectural…
Descriptors: Computer Networks, Computer System Design, Information Retrieval, Information Science
Peer reviewedLi, Wenjie; Wong, Kam-Fai; Yuan, Chunfa – Journal of the American Society for Information Science and Technology, 2001
The objective of this research is to exploit Chinese language processing techniques for temporal information extraction and concept reasoning. Outlines the characteristics of Chinese time system and temporal expressions. Discusses temporal knowledge representations. Presents a general framework for the storage and manipulation of temporal…
Descriptors: Chinese, Computer System Design, Information Processing, Information Sources
Peer reviewedCombs, Joseph, Jr. – Library Computing, 1999
Presents a general review of features of version 2.1 of Total Library Computerization (TLC) for Windows from On Point, Inc. Includes information about pricing, hardware and operating systems, modules/functions available, user interface, security, on-line catalog functions, circulation, cataloging, and documentation and online help. A table…
Descriptors: Bibliographic Records, Computer Interfaces, Computer Software, Computer System Design
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
Moldoff, David K. – 1997
The purpose of this paper is to project present trends in application development into the next decades. The revolution in information technology has reduced the cost of computer hardware as well as communications. Networks will consist of three kinds of specialized components: clients, servers, and processors. Standardization of component…
Descriptors: Computer Mediated Communication, Computer Software Evaluation, Computer System Design, Costs
Congress of the U.S., Washington, DC. House Committee on Science, Space and Technology. – 1994
This hearing explores how the High Performance Computing and Communications Program (HPCC) relates to the technology needs of industry. Testimony and prepared statements from the following witnesses on future effects of computing and networking technologies on their companies are included: (1) F. Brett Berlin, president, Brett Berlin Associates,…
Descriptors: Computer Networks, Computer System Design, Federal Legislation, Futures (of Society)
Haynes, Cynthia, Ed.; Holmevik, Jan Rune, Ed. – 1998
MOOs (Multi-User, Object-Oriented Environments), which were designed originally as spaces for online social interaction, are increasingly recognized today for their value as educational tools. This book brings together a diverse group of experts whose contributions help answer questions and dispel myths surrounding MOOs and their use in education.…
Descriptors: Computer Mediated Communication, Computer System Design, Computer Uses in Education, Educational Resources
Raphael, Chad – 2002
This paper identifies three rationales in the relevant literature for closing the gender gap in computing: economic, cultural and political. Each rationale implies a different set of indicators of present inequalities, disparate goals for creating equality, and distinct principles for software and web site design that aims to help girls overcome…
Descriptors: Computer Oriented Programs, Computer Software Development, Computer System Design, Computer Use
Peer reviewedLynch, Clifford A. – Library Hi Tech, 1990
Describes the function of the Open Systems Interconnection (OSI) Z39.50 protocol, which allows for construction of information "servers"--i.e., resources attached to a computer communications network that can be accessed by client machines to retrieve information. The relationship of Z39.5 to other OSI protocols is explained. (23…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Retrieval

Direct link
