Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Interfaces | 5 |
Computer Science | 5 |
Internet | 5 |
Computer Software | 4 |
Information Technology | 3 |
Programming | 3 |
Artificial Intelligence | 2 |
Coding | 2 |
Color | 2 |
Computer Mediated… | 2 |
Computer Networks | 2 |
More ▼ |
Source
British Journal of… | 1 |
International Association for… | 1 |
Mathematics and Computer… | 1 |
Online Submission | 1 |
Author
Courtney, Mary F. | 1 |
Dixit, R. K. | 1 |
Heller, Robert | 1 |
Hey, Jessie | 1 |
Overmyer, Scott | 1 |
Procter, Mike | 1 |
Stix, Allen | 1 |
Veletsianos, George | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Collected Works - Serial | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United Kingdom | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Veletsianos, George; Heller, Robert; Overmyer, Scott; Procter, Mike – British Journal of Educational Technology, 2010
This paper examines the effective deployment of conversational agents in virtual worlds from the perspective of researchers/practitioners in cognitive psychology, computing science, learning technologies and engineering. From a cognitive perspective, the major challenge lies in the coordination and management of the various channels of information…
Descriptors: Cues, Engineering, Cognitive Psychology, Internet
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages
Hey, Jessie – 1996
With the explosion in information resources being developed by computer scientists, subject specialists, librarians, and commercial companies, the challenge for the information professional is to keep abreast of the most significant developments and to distill the information for a wide range of users. This paper looks at some of the developments…
Descriptors: Artificial Intelligence, Cataloging, Computer Interfaces, Computer Science
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers