Publication Date
| In 2026 | 3 |
| Since 2025 | 455 |
| Since 2022 (last 5 years) | 2043 |
| Since 2017 (last 10 years) | 4016 |
| Since 2007 (last 20 years) | 6162 |
Descriptor
Source
Author
| Barnes, Tiffany | 22 |
| Armoni, Michal | 18 |
| Yadav, Aman | 17 |
| Gal-Ezer, Judith | 16 |
| Malmi, Lauri | 15 |
| Xinogalos, Stelios | 15 |
| Soh, Leen-Kiat | 14 |
| Frydenberg, Mark | 13 |
| Hazzan, Orit | 13 |
| Kafai, Yasmin B. | 13 |
| Howe, Richard D. | 12 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 724 |
| Teachers | 402 |
| Researchers | 151 |
| Policymakers | 97 |
| Administrators | 71 |
| Students | 66 |
| Media Staff | 11 |
| Parents | 9 |
| Community | 6 |
| Counselors | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| Turkey | 252 |
| Australia | 167 |
| United Kingdom | 153 |
| Canada | 131 |
| China | 118 |
| Taiwan | 118 |
| California | 115 |
| United States | 96 |
| Germany | 90 |
| Spain | 81 |
| Finland | 78 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Watters, Shana Kay – ProQuest LLC, 2010
For over 30 years, reference resolution, the process of determining what a noun phrase including a pronoun refers to in written and spoken language, has been an important and on-going area of research. Most existing pronominal reference resolution algorithms and systems are designed to use syntactic information and surface features (e.g. number…
Descriptors: Semantics, Verbs, Nouns, Computer Science
Krejci, Katherine T. – ProQuest LLC, 2010
The purpose of this qualitative descriptive study was to describe the learning outcomes of the cooperative-education experience from an Information Technology student's perspective at a large Fortune 500 manufacturing/sales company located in the Midwest United States. Open-ended interview questions were developed based on the four-component model…
Descriptors: Information Technology, Work Experience, Cooperative Education, Career Development
Krishnamurthy, Janaki – ProQuest LLC, 2010
Given the increasing competition in the software industry and the critical consequences of software errors, it has become important for companies to achieve high levels of software quality. While cost reduction and timeliness of projects continue to be important measures, software companies are placing increasing attention on identifying the user…
Descriptors: Program Evaluation, Opinions, Privacy, Prediction
Dow, Mirah J. Ingram – School Library Monthly, 2010
School librarians currently speak about school libraries as the largest classroom in the building. If so, how can these librarians describe what they teach? This article explains the user-centered instructional role of secondary school librarians in teaching information and technology literacy skills, as well as how they can authoritatively ensure…
Descriptors: School Libraries, Information Technology, Literacy, Librarians
Saban, Aslihan – Education, 2010
The purpose of this study was to examine the metaphors of exit-level Turkish computer teacher candidates about the concept of "internet". Participants included 45 seniors (23 boys and 22 girls) majoring in the Department of Computer and Instructional Technologies at Selcuk University, Ahmet Kelesoglu Faculty of Education. They were asked…
Descriptors: Educational Technology, Content Analysis, Internet, Figurative Language
Lu, Eric Jui-Lin; Horng, Gwoboa; Yu, Chia-Ssu; Chou, Ling-Ying – Educational Technology & Society, 2010
To increase the interoperability and reusability of learning objects, Advanced Distributed Learning Initiative developed a model called Content Aggregation Model (CAM) to describe learning objects and express relationships between learning objects. However, the suggested relations defined in the CAM can only describe structure-oriented…
Descriptors: Management Systems, Semantics, Metadata, Models
Shuhidan, Shuhaida; Hamilton, Margaret; D'Souza, Daryl – Computer Science Education, 2010
Learning to program is known to be difficult for novices. High attrition and high failure rates in foundation-level programming courses undertaken at tertiary level in Computer Science programs, are commonly reported. A common approach to evaluating novice programming ability is through a combination of formative and summative assessments, with…
Descriptors: Teacher Attitudes, Secondary School Teachers, College Faculty, Multiple Choice Tests
Jansson, P. M.; Ramachandran, R. P.; Schmalzel, J. L.; Mandayam, S. A. – IEEE Transactions on Education, 2010
To keep up with rapidly advancing technology, numerous innovations to the electrical and computer engineering (ECE) curriculum, learning methods and pedagogy have been envisioned, tested, and implemented. It is safe to say that no single approach will work for all of the diverse ECE technologies and every type of learner. However, a few key…
Descriptors: Engineering Education, Computer Science Education, Undergraduate Students, Student Projects
Titterton, Nathaniel; Lewis, Colleen M.; Clancy, Michael J. – Computer Science Education, 2010
Lab-centric instruction emphasizes supervised, hands-on activities by substituting lab for lecture time. It combines a multitude of pedagogical techniques into the format of an extended, structured closed lab. We discuss the range of benefits for students, including increased staff interaction, frequent and varied self-assessments, integrated…
Descriptors: Learning Activities, Computer Assisted Instruction, Mathematics Instruction, Lecture Method
Naude, Kevin A.; Greyling, Jean H.; Vogts, Dieter – Computers & Education, 2010
We present a novel approach to the automated marking of student programming assignments. Our technique quantifies the structural similarity between unmarked student submissions and marked solutions, and is the basis by which we assign marks. This is accomplished through an efficient novel graph similarity measure ("AssignSim"). Our experiments…
Descriptors: Grading, Assignments, Correlation, Interrater Reliability
Tenenberg, Josh; McCartney, Robert – Journal on Educational Resources in Computing, 2007
This issue is devoted to the curriculum guidelines from the Liberal Arts Computer Science Consortium. These guidelines provide a coherent and important model for computing education within a liberal arts context, giving primacy to critical reason, rigorous methods, and student engagement in the research process. In this regard, they are at the…
Descriptors: Guidelines, Computer Science, Liberal Arts, College Curriculum
Armoni, Michal; Gal-Ezer, Judith – Computer Science Education, 2007
Non-determinism is one of the most important, yet abstract, recurring concepts of Computer Science. It plays an important role in Computer Science areas such as formal language theory, computability theory, distributed computing, and operating systems. We conducted a series of studies on the perception of non-determinism. In the current research,…
Descriptors: Computer Science, Scientific Concepts, Computer Science Education, Abstract Reasoning
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Hasan, Ragib – ProQuest LLC, 2009
In today's world, information is increasingly created, processed, transmitted, and stored digitally. While the digital nature of information has brought enormous benefits, it has also created new vulnerabilities and attacks against data. Unlike physical documents, digitally stored information can be rapidly copied, erased, or modified. The…
Descriptors: Archives, Court Litigation, Information Management, Information Storage
Olson, Lars E. – ProQuest LLC, 2009
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
Descriptors: Databases, Access to Information, Computer Software, Computer Science

Direct link
Peer reviewed
