NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Wu, Jiang – ProQuest LLC, 2011
A transaction-consistent global checkpoint of a database records a state of the database which reflects the effect of only completed transactions and not the results of any partially executed transactions. This thesis establishes the necessary and sufficient conditions for a checkpoint of a data item (or the checkpoints of a set of data items) to…
Descriptors: Databases, Computer Networks, Performance, Evaluation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Finn, Gregory G. – 1987
This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…
Descriptors: Algorithms, Computer Networks, Computer System Design, Models
Tessmer, Martin – Performance Improvement Quarterly, 1994
Discussion of formative evaluation highlights alternative formative evaluation methods and tools and explains their advantages, disadvantages, and applicable contexts. Methods described include two-on-one evaluation; think-aloud protocols; computer interviewing; self-evaluation; panel reviews; evaluation meetings; computer journals and networks;…
Descriptors: Computer Networks, Electronic Mail, Evaluation Methods, Formative Evaluation
Daly, John A.; And Others – 1987
A study explored the thoughts people have as they interact with others in conversation. Individuals were asked to communicate with each other over networked microcomputers and as they typed their messages, they spoke aloud their thoughts about the exchanges. These oral protocols, matched with the messages exchanged over the network, were then…
Descriptors: Cognitive Processes, Communication Research, Communication (Thought Transfer), Computer Networks
Mao, Leii – 1990
This instructional guide, one of a series developed by the Technical Education Advancement Modules (TEAM) project, is a 16-hour introduction to plant floor operations. The guide is designed to develop the following competencies: (1) understanding the characteristics and components of personal computer (PC) networks; (2) computer networking…
Descriptors: Adult Education, Adult Programs, Computer Networks, Computer Oriented Programs