Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Interfaces | 5 |
| Computer Science | 5 |
| Internet | 5 |
| Computer Software | 4 |
| Information Technology | 3 |
| Programming | 3 |
| Artificial Intelligence | 2 |
| Coding | 2 |
| Color | 2 |
| Computer Mediated… | 2 |
| Computer Networks | 2 |
| More ▼ | |
Source
| British Journal of… | 1 |
| International Association for… | 1 |
| Mathematics and Computer… | 1 |
| Online Submission | 1 |
Author
| Courtney, Mary F. | 1 |
| Dixit, R. K. | 1 |
| Heller, Robert | 1 |
| Hey, Jessie | 1 |
| Overmyer, Scott | 1 |
| Procter, Mike | 1 |
| Stix, Allen | 1 |
| Veletsianos, George | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
| Collected Works - Proceedings | 1 |
| Collected Works - Serial | 1 |
| Reports - Evaluative | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| United Kingdom | 2 |
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Veletsianos, George; Heller, Robert; Overmyer, Scott; Procter, Mike – British Journal of Educational Technology, 2010
This paper examines the effective deployment of conversational agents in virtual worlds from the perspective of researchers/practitioners in cognitive psychology, computing science, learning technologies and engineering. From a cognitive perspective, the major challenge lies in the coordination and management of the various channels of information…
Descriptors: Cues, Engineering, Cognitive Psychology, Internet
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages
Hey, Jessie – 1996
With the explosion in information resources being developed by computer scientists, subject specialists, librarians, and commercial companies, the challenge for the information professional is to keep abreast of the most significant developments and to distill the information for a wide range of users. This paper looks at some of the developments…
Descriptors: Artificial Intelligence, Cataloging, Computer Interfaces, Computer Science
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
