Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
IEEE Transactions on Education | 3 |
Author
Copeland, J. A. | 1 |
Esmaeildoust, M. | 1 |
Fairbanks, K. D. | 1 |
Kettunen, H. | 1 |
Lee, C. P. | 1 |
Leppavirta, J. | 1 |
Molahosseini, A. S. | 1 |
Navi, K. | 1 |
Sihvola, A. | 1 |
Uluagac, A. S. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Audience
Teachers | 1 |
Location
Finland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Navi, K.; Molahosseini, A. S.; Esmaeildoust, M. – IEEE Transactions on Education, 2011
The residue number system (RNS) has been an important research field in computer arithmetic for many decades, mainly because of its carry-free nature, which can provide high-performance computing architectures with superior delay specifications. Recently, research on RNS has found new directions that have resulted in the introduction of efficient…
Descriptors: Number Systems, Teaching Methods, Computer System Design, Computer Science Education
Leppavirta, J.; Kettunen, H.; Sihvola, A. – IEEE Transactions on Education, 2011
Complex multistep problem exercises are one way to enhance engineering students' learning of electromagnetics (EM). This study investigates whether exposure to complex problem exercises during an introductory EM course improves students' conceptual and procedural knowledge. The performance in complex problem exercises is compared to prior success…
Descriptors: Regression (Statistics), Concept Formation, Foreign Countries, Electromechanical Technology
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education