NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 181 to 195 of 4,568 results Save | Export
Liu, Yaoqing – ProQuest LLC, 2013
The fast growth of global routing table size has been causing concerns that the Forwarding Information Base (FIB) will not be able to fit in existing routers' expensive line-card memory, and upgrades will lead to a higher cost for network operators and customers. FIB Aggregation, a technique that merges multiple FIB entries into one, is probably…
Descriptors: Computers, Computer Networks, Mathematics
Peer reviewed Peer reviewed
Direct linkDirect link
Hill, Janette; Nuss, Michelle; Cervero, Ronald; Gaines, Julie; Middendorf, Bruce; Mishra, Supriya – Journal of Interactive Learning Research, 2019
The third year clerkship is an exciting yet challenging time for medical students (Cooke, Irby, & O'Brien, 2010). For the first time, students spend significant time in clinical settings (e.g., hospitals) assisting in the daily care of patients. Obtaining just-in-time and at point-of-care information and resources (Author, 2009) is one…
Descriptors: Patients, Handheld Devices, Graduate Medical Education, Medical Services
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bathon, Justin; van Rooyan, Jean W.; Jobert, Rika – Research in Educational Administration & Leadership, 2018
This article presents a review of the development of platform network models that rely on partnership contracts to implement comprehensive school reform. The literature from the previous three decades of development of school networks, emerging largely from the United States of America, is reviewed. The recent development of similar network models…
Descriptors: Educational Change, Partnerships in Education, Contracts, Program Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Reveley, James; Peters, Michael A. – Educational Philosophy and Theory, 2016
According to Bernard Stiegler, social innovations in the educational field are an antidotical cure for social pathologies wrought by the digitalisation of society. This article explores how Stiegler's social pharmacology links to the human-technical co-constitution thesis that he first expounded in "Technics and Time, 1." Not only do we…
Descriptors: Innovation, Educational Philosophy, Computer Networks, Schemata (Cognition)
Peer reviewed Peer reviewed
Direct linkDirect link
Su, Chiu Hung; Tzeng, Gwo-Hshiung; Hu, Shu-Kung – Interactive Learning Environments, 2016
The purpose of this study was to address this problem by applying a new hybrid fuzzy multiple criteria decision-making model including (a) using the fuzzy decision-making trial and evaluation laboratory (DEMATEL) technique to construct the fuzzy scope influential network relationship map (FSINRM) and determine the fuzzy influential weights of the…
Descriptors: Electronic Learning, Decision Making, Feedback (Response), Computer Networks
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Edwards, Darla – Learning Professional, 2019
A networked improvement community can be a tremendous resource for people who share a common interest and desire to learn from each other, and, thanks to technology, this can occur even when participants are separated by a large distance. This article discusses Virginia Advanced Study Strategies' Rural Math Innovation Network, a four-year project…
Descriptors: Networks, Rural Schools, Middle Schools, High Schools
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Xiang, Qiao – ProQuest LLC, 2014
As wireless cyber-physical systems (WCPS) are increasingly being deployed in mission-critical applications, it becomes imperative that we consider application QoS requirements in in-network processing (INP). In this dissertation, we explore the potentials of two INP methods, packet packing and network coding, on improving network performance while…
Descriptors: Computer Networks, Telecommunications, Efficiency, Reliability
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tomczyk, Lukasz; Szyszka, Michal; Stošic, Lazar – Education Sciences, 2020
Problematic Internet Use (PIU) has of late come to the major attention of researchers of risky behaviours. For parents and teachers in turn, the various pathological forms of Internet use have become more and more noticeable. In recent years, the operationalisation of the term PIU has also been discussed and attempts to measure its various…
Descriptors: Internet, Risk, Behavior Problems, Pathology
Peer reviewed Peer reviewed
Direct linkDirect link
MacLeod, Jason; Yang, Harrison Hao; Zhu, Sha; Shi, Yinghui – Journal of Educational Computing Research, 2018
In an effort to address student engagement challenges, much research has explored student-to-student connected classroom climate (CCC). Research positively associates CCC to the benefits of student integration, learning, and retention in face-to-face environments. However, few studies have examined CCC in computer-mediated environments. This study…
Descriptors: Classroom Environment, Computer Networks, Computer Software, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Alghamdi, Naif; den Heijer, Alexandra; de Jonge, Hans – International Journal of Sustainability in Higher Education, 2017
Purpose: The purpose of this paper is to analyse 12 assessment tools of sustainability in universities and develop the structure and the contents of these tools to be more intelligible. The configuration of the tools reviewed highlight indicators that clearly communicate only the essential information. This paper explores how the theoretical…
Descriptors: Universities, Sustainability, Institutional Evaluation, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Hashim, Ayesha K. – Journal of Education Finance, 2022
Internet connectivity has become a critical resource for teaching and learning. The Common Core State Standards (CCSS) is a prime example, with schools expected to implement online assessments and use online resources for instruction. Yet there is little known about the extent to which local education agencies (LEAs) and schools are taking…
Descriptors: Common Core State Standards, Computer Assisted Testing, Longitudinal Studies, School Districts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pytlarz, Ian; Pu, Shi; Patel, Monal; Prabhu, Rajini – International Educational Data Mining Society, 2018
Identifying at-risk students at an early stage is a challenging task for colleges and universities. In this paper, we use students' oncampus network traffic volume to construct several useful features in predicting their first semester GPA. In particular, we build proxies for their attendance, class engagement, and out-of-class study hours based…
Descriptors: College Freshmen, Grade Point Average, At Risk Students, Academic Achievement
Pages: 1  |  ...  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  ...  |  305