NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 91 to 105 of 463 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Boyle, Tom – Computers & Education, 2010
The use of ICT to enhance teaching and learning depends on effective design, which operates at many levels of granularity from the small to the very large. This reflects the range of educational problems from course design down to the design of activities focused on specific learning objectives. For maximum impact these layers of design need to be…
Descriptors: Design Requirements, Research and Development, Instructional Design, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Mu-Yen; Chang, Francis Mou-Te; Chen, Chia-Chen; Huang, Mu-Jung; Chen, Jing-Wen – Educational Technology & Society, 2012
As the use of Information Technology (IT) applications has become more widespread, focus has turned toward applying IT to the learning domain, with policy initiatives aimed at integrating IT with teaching. E-Portfolios have assumed growing importance in higher education as institutions seek new teaching-learning-assessment tools to increase…
Descriptors: Foreign Countries, Student Motivation, Student Attitudes, Information Technology
Bitton, Ephrat – ProQuest LLC, 2011
This dissertation explores the use of geometric and graphical models for a variety of information search and filtering applications. These models serve to provide an intuitive understanding of the problem domains and as well as computational efficiencies to our solution approaches. We begin by considering a search and rescue scenario where both…
Descriptors: Safety, Opinions, Hypothesis Testing, Intuition
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Ali, Qasim – ProQuest LLC, 2009
Collective communication allows efficient communication and synchronization among a collection of processes, unlike point-to-point communication that only involves a pair of communicating processes. Achieving high performance for both kernels and full-scale applications running on a distributed memory system requires an efficient implementation of…
Descriptors: Workstations, Mathematics, Computer System Design, Programming
Huang, Peng – ProQuest LLC, 2010
Innovation ecosystem strategy is often adopted by platform technology owners to seek complementary innovation from resources located outside the firm to exploit indirect network effect. In this dissertation I aim to address the issues that are related to the formation and business value of platform innovation ecosystems in the enterprise software…
Descriptors: Industry, Intellectual Property, Innovation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Guruler, Huseyin; Istanbullu, Ayhan; Karahasan, Mehmet – Computers & Education, 2010
Knowledge discovery is a wide ranged process including data mining, which is used to find out meaningful and useful patterns in large amounts of data. In order to explore the factors having impact on the success of university students, knowledge discovery software, called MUSKUP, has been developed and tested on student data. In this system a…
Descriptors: Income, Computer Software, Databases, Data Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Kostaras, N.; Xenos, M.; Skodras, A. N. – IEEE Transactions on Education, 2011
This paper presents the usability evaluation of a digital systems laboratory class offered to distance-learning students. It details the way in which students can participate remotely in such a laboratory, the methodology employed in the usability assessment of the laboratory infrastructure (hardware and software), and also outlines the main…
Descriptors: Foreign Countries, Educational Quality, Laboratories, Pilot Projects
Davault, Julius M., III. – ProQuest LLC, 2009
One of the problems associated with automatic thesaurus construction is with determining the semantic relationship between word pairs. Quasi-synonyms provide a type of equivalence relationship: words are similar only for purposes of information retrieval. Determining such relationships in a thesaurus is hard to achieve automatically. The term…
Descriptors: Semantics, Information Retrieval, Computational Linguistics, Reference Materials
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nordin, Norazah; Ibrahim, Sham; Mohd. Hamzah, Mohd. Izham; Embi, Mohamed Amin; Din, Rosseni – Turkish Online Journal of Educational Technology - TOJET, 2012
The development in information technology has now moved from the first wave that emphasises on computer technical skills to the second wave which focuses on the application and management aspects. This paper aims to investigate the use of learning management system among future school heads in education management and leadership. The study was…
Descriptors: Educational Technology, Information Technology, Leadership, Learning Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Lau, Paul Ngee Kiong; Lau, Sie Hoe; Hong, Kian Sam; Usop, Hasbee – Educational Technology & Society, 2011
The number right (NR) method, in which students pick one option as the answer, is the conventional method for scoring multiple-choice tests that is heavily criticized for encouraging students to guess and failing to credit partial knowledge. In addition, computer technology is increasingly used in classroom assessment. This paper investigates the…
Descriptors: Guessing (Tests), Multiple Choice Tests, Computers, Scoring
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Ryan, Jenna; Porter, Marjorie; Miller, Rebecca – Journal of Information Technology Education, 2010
Current literature on libraries is abundant with articles about the uses and the potential of new interactive communication technology, including Web 2.0 tools. Recently, the advent and use of virtual worlds have received top billing in these works. Many library institutions are exploring these virtual environments; this exploration and the…
Descriptors: Academic Libraries, Virtual Classrooms, Social Environment, Library Automation
Peer reviewed Peer reviewed
Direct linkDirect link
Goel, Sanjay; Kathuria, Vanshi – Journal of Information Technology Education, 2010
The majority of an engineer's time in the software industry is spent working with other programmers. Agile methods of software development like eXtreme Programming strongly rely upon practices like daily meetings and pair programming. Hence, the need to learn the skill of working collaboratively is of primary importance for software developers.…
Descriptors: Computer Science Education, Programming, Teaching Methods, Introductory Courses
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  31