Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 6 |
Protocol Analysis | 6 |
Access to Information | 1 |
Active Learning | 1 |
Adult Education | 1 |
Adult Programs | 1 |
Algorithms | 1 |
Case Studies | 1 |
Cognitive Processes | 1 |
College Students | 1 |
Communication (Thought… | 1 |
More ▼ |
Author
Daly, John A. | 1 |
Finn, Gregory G. | 1 |
Howard, Elizabeth V. | 1 |
Mao, Leii | 1 |
Tessmer, Martin | 1 |
Woods, David M. | 1 |
Wu, Jiang | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Guides - Classroom - Learner | 1 |
Guides - Classroom - Teacher | 1 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Students | 1 |
Teachers | 1 |
Location
Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wu, Jiang – ProQuest LLC, 2011
A transaction-consistent global checkpoint of a database records a state of the database which reflects the effect of only completed transactions and not the results of any partially executed transactions. This thesis establishes the necessary and sufficient conditions for a checkpoint of a data item (or the checkpoints of a set of data items) to…
Descriptors: Databases, Computer Networks, Performance, Evaluation
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Finn, Gregory G. – 1987
This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…
Descriptors: Algorithms, Computer Networks, Computer System Design, Models
Tessmer, Martin – Performance Improvement Quarterly, 1994
Discussion of formative evaluation highlights alternative formative evaluation methods and tools and explains their advantages, disadvantages, and applicable contexts. Methods described include two-on-one evaluation; think-aloud protocols; computer interviewing; self-evaluation; panel reviews; evaluation meetings; computer journals and networks;…
Descriptors: Computer Networks, Electronic Mail, Evaluation Methods, Formative Evaluation
Concurrent Cognitions during Conversations: Protocol Analyses as a Means of Exploring Conversations.
Daly, John A.; And Others – 1987
A study explored the thoughts people have as they interact with others in conversation. Individuals were asked to communicate with each other over networked microcomputers and as they typed their messages, they spoke aloud their thoughts about the exchanges. These oral protocols, matched with the messages exchanged over the network, were then…
Descriptors: Cognitive Processes, Communication Research, Communication (Thought Transfer), Computer Networks
Mao, Leii – 1990
This instructional guide, one of a series developed by the Technical Education Advancement Modules (TEAM) project, is a 16-hour introduction to plant floor operations. The guide is designed to develop the following competencies: (1) understanding the characteristics and components of personal computer (PC) networks; (2) computer networking…
Descriptors: Adult Education, Adult Programs, Computer Networks, Computer Oriented Programs