NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 886 to 900 of 3,459 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Thomas, M. S.; Kothari, D. P.; Prakash, A. – IEEE Transactions on Education, 2011
Automation of power systems is gaining momentum across the world, and there is a need to expose graduate and undergraduate students to the latest developments in hardware, software, and related protocols for power automation. This paper presents the design, development, and commissioning of an automation lab to facilitate the understanding of…
Descriptors: Foreign Countries, Undergraduate Students, Graduate Students, Computer Assisted Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Kumar, R.; Rose, C. P. – IEEE Transactions on Learning Technologies, 2011
Tutorial Dialog Systems that employ Conversational Agents (CAs) to deliver instructional content to learners in one-on-one tutoring settings have been shown to be effective in multiple learning domains by multiple research groups. Our work focuses on extending this successful learning technology to collaborative learning settings involving two or…
Descriptors: Educational Technology, Computer Software, Computer Software Evaluation, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Khandaker, N.; Soh, Leen-Kiat; Miller, L. D.; Eck, A.; Jiang, Hong – IEEE Transactions on Learning Technologies, 2011
Recent years have seen a surge in the use of intelligent computer-supported collaborative learning (CSCL) tools for improving student learning in traditional classrooms. However, adopting such a CSCL tool in a classroom still requires the teacher to develop (or decide on which to adopt) the CSCL tool and the CSCL script, design the relevant…
Descriptors: Web 2.0 Technologies, Instructional Design, Program Implementation, Cooperative Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bennane, Abdellah – Informatics in Education, 2010
Tutoring systems become complex and are offering varieties of pedagogical software as course modules, exercises, simulators, systems online or offline, for single user or multi-user. This complexity motivates new forms and approaches to the design and the modelling. Studies and research in this field introduce emergent concepts that allow the…
Descriptors: Tutoring, Intelligent Tutoring Systems, Courseware, Computer Science Education
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Ryan, Jenna; Porter, Marjorie; Miller, Rebecca – Journal of Information Technology Education, 2010
Current literature on libraries is abundant with articles about the uses and the potential of new interactive communication technology, including Web 2.0 tools. Recently, the advent and use of virtual worlds have received top billing in these works. Many library institutions are exploring these virtual environments; this exploration and the…
Descriptors: Academic Libraries, Virtual Classrooms, Social Environment, Library Automation
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, DeeAnn – Journal of Web Librarianship, 2010
Libraries today face an increasing challenge: to provide relevant information to diverse populations with differing needs while competing with Web search engines like Google. In 2009, a large group of libraries, including the University of Nebraska-Lincoln Libraries, joined with Innovative Interfaces as development partners to design a new type of…
Descriptors: Search Engines, Internet, Academic Libraries, Library Development
Peer reviewed Peer reviewed
Direct linkDirect link
Adamson, Bob – Australasian Journal of Educational Technology, 2010
This paper describes the production of a software program for Master of Education students studying the "Introduction to Research Methods" course at a tertiary institution in Hong Kong. The course was originally delivered in a lecture mode, which proved unsatisfactory in providing sufficient learning support for the students. The paper…
Descriptors: Constructivism (Learning), Instructional Design, Research Methodology, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Goel, Sanjay; Kathuria, Vanshi – Journal of Information Technology Education, 2010
The majority of an engineer's time in the software industry is spent working with other programmers. Agile methods of software development like eXtreme Programming strongly rely upon practices like daily meetings and pair programming. Hence, the need to learn the skill of working collaboratively is of primary importance for software developers.…
Descriptors: Computer Science Education, Programming, Teaching Methods, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Brackenbury, L. E. M.; Plana, L. A.; Pepper, J. – IEEE Transactions on Education, 2010
The system-on-chip module described here builds on a grounding in digital hardware and system architecture. It is thus appropriate for third-year undergraduate computer science and computer engineering students, for post-graduate students, and as a training opportunity for post-graduate research students. The course incorporates significant…
Descriptors: Foreign Countries, Computer System Design, Teamwork, Learning Modules
Peer reviewed Peer reviewed
Direct linkDirect link
O'Reilly, Meg; Lefoe, Gerry; Philip, Robyn; Parrish, Dominique – International Journal on E-Learning, 2010
The Australasian Society for Computers in Learning in Tertiary Education ("ascilite") has recently completed research to inform development of the ALTC Exchange, a new online service for learning and teaching in Australia. The research investigated resource identification and contribution, engagement with the repository and user…
Descriptors: User Needs (Information), Higher Education, Foreign Countries, Shared Resources and Services
Peer reviewed Peer reviewed
Direct linkDirect link
Santoro, Lana Edwards; Bishop, M. J. – Computers in the Schools, 2010
It seems appropriate, if not necessary, to use empirically supported criteria to evaluate reading software applications. This study's purpose was to develop a research-based evaluation framework and review selected beginning reading software that might be used with struggling beginning readers. Thirty-one products were reviewed according to…
Descriptors: Beginning Reading, Emergent Literacy, Computer Software Evaluation, Computer Software Selection
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Kate; Reimann, Peter – Computers & Education, 2010
A classification system that was developed for the use of agent-based models was applied to strategies used by school-aged students to interrogate an agent-based model and a system dynamics model. These were compared, and relationships between learning outcomes and the strategies used were also analysed. It was found that the classification system…
Descriptors: Prior Learning, Classification, Comparative Analysis, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Zheng, Lanqin; Yang, Kaicheng; Huang, Ronghuai – Educational Technology & Society, 2012
This study proposes a new method named the IIS-map-based method for analyzing interactions in face-to-face collaborative learning settings. This analysis method is conducted in three steps: firstly, drawing an initial IIS-map according to collaborative tasks; secondly, coding and segmenting information flows into information items of IIS; thirdly,…
Descriptors: Foreign Countries, Computer Uses in Education, Program Effectiveness, Research Methodology
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Pages: 1  |  ...  |  56  |  57  |  58  |  59  |  60  |  61  |  62  |  63  |  64  |  ...  |  231