NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)5
Audience
Laws, Policies, & Programs
Assessments and Surveys
Program for International…1
What Works Clearinghouse Rating
Showing all 6 results Save | Export
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mandal, Sraboni; Sanjay; Shrivastava, Rajnish – Turkish Online Journal of Distance Education, 2010
Presence of a teacher appraisal system plays a major role in deciding the level of professionalism of an educational institution. In addition to this it also plays a major role in improvement in quality of education imparted by the teacher. Recently assessment of the teaching fraternity has become indispensable measure and thus it is necessary to…
Descriptors: Foreign Countries, Teacher Evaluation, Technical Institutes, Case Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Gong, Tao; Cai, Zixing – International Journal on E-Learning, 2006
To overcome weakness and faults of a web-based e-learning course such as Artificial Intelligence (AI), an immune agent was proposed, simulating a natural immune mechanism against a virus. The immune agent was built on the multi-dimension education agent model and immune algorithm. The web-based AI course was comprised of many files, such as HTML…
Descriptors: Educational Technology, Internet, Online Courses, Artificial Intelligence
Peer reviewed Peer reviewed
Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers