NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 53 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Kamal, Ahmed Tashrif – ProQuest LLC, 2013
Due to their high fault-tolerance, ease of installation and scalability to large networks, distributed algorithms have recently gained immense popularity in the sensor networks community, especially in computer vision. Multi-target tracking in a camera network is one of the fundamental problems in this domain. Distributed estimation algorithms…
Descriptors: Computer Networks, Mathematics, Computation, Information Transfer
Paul, Utpal Kumar – ProQuest LLC, 2012
Since the days Internet traffic proliferated, measurement, monitoring and analysis of network traffic have been critical to not only the basic understanding of large networks, but also to seek improvements in resource management, traffic engineering and security. At the current times traffic in wireless local and wide area networks are facing…
Descriptors: Computer Networks, Telecommunications, Information Networks, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Arling, Priscilla A. – Journal of Information Systems Education, 2009
One way to bring concepts to life in an introductory data networks course is for students to physically build a network that addresses a real business problem. However it can be challenging to find a suitable business problem, particularly if the network can exist only during the class period. This case presents a realistic business scenario and…
Descriptors: Information Technology, Internet, Computer Networks, Teamwork
Peer reviewed Peer reviewed
Direct linkDirect link
Schoedel, Eric – EDUCAUSE Quarterly, 2009
Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…
Descriptors: Computer Networks, Telecommunications, Statewide Planning, Technology Planning
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Hinich, Melvin J.; Molyneux, Robert E. – Journal of the American Society for Information Science and Technology, 2003
Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)
Descriptors: Computer Networks, Information Transfer, Internet, Predictive Measurement
Peer reviewed Peer reviewed
Direct linkDirect link
Mandrekar, Ishan; Prevelakis, Vassilis; Turner, David Michael – Campus-Wide Information Systems, 2004
The authors have developed the "Ethernet Speaker" (ES), a network-enabled single board computer embedded into a conventional audio speaker. Audio streams are transmitted in the local area network using multicast packets, and the ES can select any one of them and play it back. A key requirement for the ES is that it must be capable of playing any…
Descriptors: Internet, Computer Networks, Audio Equipment, Information Transfer
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Nickerson, Gord – Computers in Libraries, 1991
Explains File Transfer Protocol (FTP), an application software program that allows a user to transfer files from one computer to another. The benefit of the rapid operating speed of FTP is discussed, the use of FTP on microcomputers, minicomputers, and workstations is described, and FTP problems are considered. (four references) (LRW)
Descriptors: Computer Networks, Computer Software, File Transfer Protocol, Information Transfer
Borgman, Christine L. – Proceedings of the ASIS Annual Meeting, 1995
Discussion of the Global Information Infrastructure (GII) focuses on a longitudinal study conducted in Central and Eastern Europe that investigated two issues: (1) the relationship between computing networks and library automation in establishing a national information infrastructure, and (2) requirements for library automation for exchanging…
Descriptors: Computer Networks, Foreign Countries, Global Approach, Information Retrieval
Harris, Judi – Computing Teacher, 1993
Provides brief descriptions of Gopher, Veronica, Jughead, and Archie, four free tools designed to locate electronic information resources on the Internet. Basic directions for using each of the four tools are provided. (KRN)
Descriptors: Computer Networks, Computer Software, Databases, Electronic Publishing
Lockwood, Russ; And Others – Personal Computing, 1988
Contains articles which review communications software. Includes "Crosstalk Mark 4,""ProComm,""Freeway Advanced,""Windows InTalk,""Relay Silver," and "Smartcom III." Compares in terms of text proprietary, MCI upload, Test ASCII, Spreadsheet Proprietary, Text XMODEM, Spreadsheet XMODEM, MCI Download, Documentation, Support and Service, ease of use,…
Descriptors: Communications, Computer Networks, Computer Software, Computer Software Reviews
Lockwood, Russ – Personal Computing, 1988
Lists general purpose communication programs for personal computers along with manufacturers' names and addresses, key data on each product, and comments. Includes memory requirements, price, BAUD rates, terminals, and protocols. Sixty-four manufacturers are listed. (CW)
Descriptors: Communications, Computer Networks, Computer Software, Computer Software Reviews
Falsetti, Julie – 1995
One segment of a computerized adventure game system (Multi-User Dimensions, or MUD) designed for learners of English as a second language (ESL) is described. The acronym MOO refers to MUD Object Oriented, the programming language used for the system. The system allows for individuals in different locations to communicate directly with each other,…
Descriptors: Computer Networks, Computer Software, English (Second Language), Games
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4