Publication Date
In 2025 | 2 |
Since 2024 | 13 |
Since 2021 (last 5 years) | 13 |
Since 2016 (last 10 years) | 20 |
Since 2006 (last 20 years) | 229 |
Descriptor
Computer System Design | 463 |
Information Technology | 463 |
Computer Software | 128 |
Educational Technology | 104 |
Computer Networks | 87 |
Foreign Countries | 87 |
Internet | 87 |
Information Systems | 83 |
Higher Education | 75 |
Computer Uses in Education | 65 |
Programming | 62 |
More ▼ |
Source
Author
Burmood, Jennifer, Comp. | 3 |
Nixon, Carol, Comp. | 3 |
Chen, Chun-Hua | 2 |
Flaherty, William | 2 |
Grush, Mary | 2 |
Huang, Chenn-Jung | 2 |
Lunin, Lois F. | 2 |
Luo, Yun-Cheng | 2 |
Lynch, Clifford A. | 2 |
Marchionini, Gary | 2 |
Smith, Peter, Ed. | 2 |
More ▼ |
Publication Type
Education Level
Higher Education | 114 |
Postsecondary Education | 68 |
Elementary Secondary Education | 24 |
Adult Education | 15 |
Secondary Education | 8 |
High Schools | 5 |
Elementary Education | 2 |
Location
United Kingdom | 9 |
California | 8 |
Taiwan | 7 |
Pennsylvania | 6 |
United States | 6 |
Canada | 5 |
India | 5 |
Spain | 5 |
Australia | 4 |
Massachusetts | 4 |
Germany | 3 |
More ▼ |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Carl D Perkins Vocational and… | 1 |
Health Insurance Portability… | 1 |
No Child Left Behind Act 2001 | 1 |
Telecommunications Act 1996 | 1 |
Assessments and Surveys
ACT Assessment | 1 |
Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
Loh, Matthew – ProQuest LLC, 2013
The scalability of CMOS technology has driven computation into a diverse range of applications across the power consumption, performance and size spectra. Communication is a necessary adjunct to computation, and whether this is to push data from node-to-node in a high-performance computing cluster or from the receiver of wireless link to a neural…
Descriptors: Power Technology, Scaling, Computer Science, Computation
Clark, Joseph Warren – ProQuest LLC, 2012
In turbulent business environments, change is rapid, continuous, and unpredictable. Turbulence undermines those adaptive problem solving methods that generate solutions by extrapolating from what worked (or did not work) in the past. To cope with this challenge, organizations utilize trial-based problem solving (TBPS) approaches in which they…
Descriptors: Problem Solving, Simulation, Marketing, Models
Kharabe, Amol T. – ProQuest LLC, 2012
Over the last two decades, firms have operated in "increasingly" accelerated "high-velocity" dynamic markets, which require them to become "agile." During the same time frame, firms have increasingly deployed complex enterprise systems--large-scale packaged software "innovations" that integrate and automate…
Descriptors: Computer Software, Computer System Design, Innovation, Organizational Effectiveness
Zhao, Weiyi – ProQuest LLC, 2011
Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…
Descriptors: Telecommunications, Internet, Computer System Design, Handheld Devices
An Approach to Semantic Interoperability for Improved Capability Exchanges in Federations of Systems
Moschoglou, Georgios – ProQuest LLC, 2013
This study seeks an affirmative answer to the question whether a knowledge-based approach to system of systems interoperation using semantic web standards and technologies can provide the centralized control of the capability for exchanging data and services lacking in a federation of systems. Given the need to collect and share real-time…
Descriptors: Semantics, Information Technology, Standards, Information Systems
Tadesse, Yohannes – ProQuest LLC, 2012
The importance of information security has made many organizations to invest and utilize effective information security controls within the information systems (IS) architecture. An organization's strategic decisions to secure enterprise-wide services often associated with the overall competitive advantages that are attained through the process of…
Descriptors: Information Security, Computer System Design, Information Systems, Information Technology
Parra Santander, Denis Alejandro – ProQuest LLC, 2013
Since the introduction of Tapestry in 1990, research on recommender systems has traditionally focused on the development of algorithms whose goal is to increase the accuracy of predicting users' taste based on historical data. In the last decade, this research has diversified, with "human factors" being one area that has received…
Descriptors: Computer System Design, Information Technology, User Needs (Information), Trust (Psychology)
Seyed, Ali Patrice – ProQuest LLC, 2012
The Open Biomedical Ontology (OBO) Foundry initiative is a collaborative effort for developing interoperable, science-based ontologies. The Basic Formal Ontology (BFO) serves as the upper ontology for the domain-level ontologies of OBO. BFO is an upper ontology of types as conceived by defenders of realism. Among the ontologies developed for OBO…
Descriptors: Evaluation Criteria, Computer Software, Expertise, Programming
Park, Dong-Jun – ProQuest LLC, 2011
Detection of events and actions in video entails substantial processing of very large, even open-ended, video streams. Video data present a unique challenge for the information retrieval community because properly representing video events is challenging. We propose a novel approach to analyze temporal aspects of video data. We consider video data…
Descriptors: Information Retrieval, Video Technology, Data Analysis, Search Strategies
Harrell, J. Michael – ProQuest LLC, 2011
Enterprise architecture is a relatively new concept that arose in the latter half of the twentieth century as a means of managing the information technology resources within the enterprise. Borrowing from the disciplines of brick and mortar architecture, software engineering, software architecture, and systems engineering, the enterprise…
Descriptors: Information Technology, Case Studies, Computer Software, Business Administration
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Filipowski, Tomasz; Kazienko, Przemyslaw; Brodka, Piotr; Kajdanowicz, Tomasz – Behaviour & Information Technology, 2012
Knowledge exchange between employees is an essential feature of recent commercial organisations on the competitive market. Based on the data gathered by various information technology (IT) systems, social links can be extracted and exploited in knowledge exchange systems of a new kind. Users of such a system ask their queries and the system…
Descriptors: Expertise, Informal Education, Information Technology, Workplace Learning
Boxwell, Stephen A. – ProQuest LLC, 2011
Treebanks are a necessary prerequisite for many NLP tasks, including, but not limited to, semantic role labeling. For many languages, however, treebanks are either nonexistent or too small to be useful. Time-critical applications may require rapid deployment of natural language software for a new critical language--much faster than the development…
Descriptors: Natural Language Processing, Training, Programming, Computer System Design