NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 31 to 45 of 321 results Save | Export
Black, August – ProQuest LLC, 2011
The research presented in this dissertation studies and describes how technical standards, protocols, and application programming interfaces (APIs) shape the aesthetic, functional, and affective nature of our most dominant mode of online communication, the World Wide Web (WWW). I examine the politically charged and contentious battle over browser…
Descriptors: Internet, Web Browsers, Standards, Economic Factors
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Volodina, Elena; Borin, Lars – Research-publishing.net, 2012
This paper reports on the ongoing international project "System architecture for ICALL" and the progress made by the Swedish partner. The Swedish team is developing a web-based exercise generator reusing available annotated corpora and lexical resources. Apart from the technical issues like implementation of the user interface and the…
Descriptors: Foreign Countries, Swedish, Open Source Technology, Web Based Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Hsu, I-Ching – Educational Technology & Society, 2012
The concept of learning objects has been applied in the e-learning field to promote the accessibility, reusability, and interoperability of learning content. Learning Object Metadata (LOM) was developed to achieve these goals by describing learning objects in order to provide meaningful metadata. Unfortunately, the conventional LOM lacks the…
Descriptors: Electronic Learning, Metadata, Knowledge Representation, Artificial Intelligence
Agarwal, Mayank – ProQuest LLC, 2009
The shift of the microprocessor industry towards multicore architectures has placed a huge burden on the programmers by requiring explicit parallelization for performance. Implicit Parallelization is an alternative that could ease the burden on programmers by parallelizing applications "under the covers" while maintaining sequential semantics…
Descriptors: Computers, Computer System Design, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Lama, Manuel; Vidal, Juan C.; Otero-Garcia, Estefania; Bugarin, Alberto; Barro, Senen – Educational Technology & Society, 2012
Large-sized repositories of learning objects (LOs) are difficult to create and also to maintain. In this paper we propose a way to reduce this drawback by improving the classification mechanisms of the LO repositories. Specifically, we present a solution to automate the LO classification of the Universia repository, a collection of more than 15…
Descriptors: Foreign Countries, Electronic Libraries, Metadata, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Filipowski, Tomasz; Kazienko, Przemyslaw; Brodka, Piotr; Kajdanowicz, Tomasz – Behaviour & Information Technology, 2012
Knowledge exchange between employees is an essential feature of recent commercial organisations on the competitive market. Based on the data gathered by various information technology (IT) systems, social links can be extracted and exploited in knowledge exchange systems of a new kind. Users of such a system ask their queries and the system…
Descriptors: Expertise, Informal Education, Information Technology, Workplace Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Touretzky, David S. – Computer Science Education, 2013
Modern robots, like today's smartphones, are complex devices with intricate software systems. Introductory robot programming courses must evolve to reflect this reality, by teaching students to make use of the sophisticated tools their robots provide rather than reimplementing basic algorithms. This paper focuses on teaching with Tekkotsu, an open…
Descriptors: Robotics, Computer Science Education, Programming, Science Curriculum
Boxwell, Stephen A. – ProQuest LLC, 2011
Treebanks are a necessary prerequisite for many NLP tasks, including, but not limited to, semantic role labeling. For many languages, however, treebanks are either nonexistent or too small to be useful. Time-critical applications may require rapid deployment of natural language software for a new critical language--much faster than the development…
Descriptors: Natural Language Processing, Training, Programming, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Zemirline, N.; Bourda, Y.; Reynaud, C. – IEEE Transactions on Learning Technologies, 2012
Today, there is a real challenge to enable personalized access to information. Several systems have been proposed to address this challenge including Adaptive Hypermedia Systems (AHSs). However, the specification of adaptation strategies remains a difficult task for creators of such systems. In this paper, we consider the problem of the definition…
Descriptors: Programming, Programming Languages, Computer Software, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad – Journal of Information Technology Education, 2011
Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…
Descriptors: Foreign Countries, Plagiarism, Programming Languages, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
García-García, César; Fernández-Robles, José Luis; Larios-Rosillo, Victor; Luga, Hervé – International Journal of Game-Based Learning, 2012
This article presents the current development of a serious game for the simulation of massive evacuations. The purpose of this project is to promote self-protection through awareness of the procedures and different possible scenarios during the evacuation of a massive event. Sophisticated behaviors require massive computational power and it has…
Descriptors: Computer Games, Computer Simulation, Educational Games, Crisis Management
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, Erik – Journal of Web Librarianship, 2010
The author recently created a presentation using HTML5 based on a tutorial put together by Marcin Wichary. The example presentation is part proof-of-concept, part instructional piece, and it is part of a larger site on HTML5 and how one can use it to create rich Web-based applications. The more he delved into HTML5, the more he found that it was…
Descriptors: Internet, Programming Languages, Programming, Computer System Design
Kim, Jaewook – ProQuest LLC, 2011
One of the most critical steps to integrating heterogeneous e-Business applications using different XML schemas is schema matching, which is known to be costly and error-prone. Many automatic schema matching approaches have been proposed, but the challenge is still daunting because of the complexity of schemas and immaturity of technologies in…
Descriptors: Information Technology, Information Retrieval, Programming Languages, Programming
Jonnalagadda, Siddhartha – ProQuest LLC, 2011
In the current millennium, extensive use of computers and the internet caused an exponential increase in information. Few research areas are as important as information extraction, which primarily involves extracting concepts and the relations between them from free text. Limitations in the size of training data, lack of lexicons and lack of…
Descriptors: Sentences, Semantics, Biomedicine, Information Retrieval
Peer reviewed Peer reviewed
Direct linkDirect link
Lazarinis, Fotis; Green, Steve; Pearson, Elaine – Interactive Learning Environments, 2011
In this article, we present the characteristics and the design of a modular personalized multimedia testing tool based fully on XML learning specifications. Personalization is based on the characteristics of the individual learners, thus the testing paths are tailored to their needs and goals. The system maintains learner profiles rich in content…
Descriptors: Multimedia Materials, Computer Assisted Testing, Computer Software Evaluation, Computer Software
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  22