NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 481 to 495 of 4,561 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2010
Cloud computing is increasingly popular in education. Cloud computing is "the delivery of computer services from vast warehouses of shared machines that enables companies and individuals to cut costs by handing over the running of their email, customer databases or accounting software to someone else, and then accessing it over the internet."…
Descriptors: Computer Software, Internet, Computer Software Evaluation, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Sherrell, Linda; Krishna, Bhagavathy; Velaga, Natasha; Vejandla, Pavan; Satharla, Mahesh – Journal of Computers in Mathematics and Science Teaching, 2010
Agile methodologies have become increasingly popular among software developers as evidenced by industrial participation at related conferences. The popularity of agile practices over traditional techniques partly stems from the fact that these practices provide for more customer involvement and better accommodate rapidly changing requirements,…
Descriptors: Computer Software, Methods, Independent Study, Graduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, Erik T. – Journal of Web Librarianship, 2010
One of the first big shifts in how libraries manage resources was the move from print-journal purchasing models to database-subscription and electronic-journal purchasing models. Libraries found that this transition helped them scale their resources and provide better service just by thinking a bit differently about their services. Likewise,…
Descriptors: Libraries, Library Materials, Electronic Publishing, Electronic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Larney, Sarah; Burns, Lucy – Evaluation Review, 2011
Individuals in contact with the criminal justice system are a key population of concern to public health. Record linkage studies can be useful for studying health outcomes for this group, but the use of aliases complicates the process of linking records across databases. This study was undertaken to determine the impact of aliases on sensitivity…
Descriptors: Criminals, Public Health, Justice, Institutionalized Persons
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Chia-Chen; Huang, Tien-Chi – Computers & Education, 2012
Context-awareness techniques can support learners in learning without time or location constraints by using mobile devices and associated learning activities in a real learning environment. Enrichment of context-aware technologies has enabled students to learn in an environment that integrates learning resources from both the real world and the…
Descriptors: Learning Strategies, Museums, Foreign Countries, Educational Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Tu, Chih-Hsiung; Sujo-Montes, Laura; Yen, Cherng-Jyh; Chan, Junn-Yih; Blocher, Michael – TechTrends: Linking Research and Practice to Improve Learning, 2012
Learning management systems traditionally provide structures to guide online learners to achieve their learning goals. Web 2.0 technology empowers learners to create, share, and organize their personal learning environments in open network environments; and allows learners to engage in social networking and collaborating activities. Advanced…
Descriptors: Online Courses, Computer Assisted Instruction, Educational Technology, Course Descriptions
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2009
Hiring substitute teachers used to be an early-morning calling burden for staff members at schools in Oregon's Coos Bay School District. Now that work has been passed off to Aesop, a service from Frontline Placement Technologies, which springs into action upon receiving a notification, either by call or log-in, from a teacher reporting an absence.…
Descriptors: Computer Software, School Districts, Educational Technology, Substitute Teachers
Yan, Gongjun – ProQuest LLC, 2010
Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…
Descriptors: Confidentiality, Electronic Equipment, Geographic Location, Probability
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, M.-H.; Huang, M.-C.; Ting, Y.-C.; Chen, H.-H.; Li, T.-L. – IEEE Transactions on Education, 2010
In this article, a course on high-frequency wireless communications systems is presented. With the 145-MHz baseband subsystem available from a prerequisite course, the present course emphasizes the design and implementation of the 2.45-GHz front-end subsystem as well as system integration issues. In this curriculum, the 2.45-GHz front-end…
Descriptors: Prerequisites, Laboratories, Telecommunications, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Klemke, Roland; Ternier, Stefaan; Kalz, Marco; Specht, Marcus – British Journal of Educational Technology, 2010
Making learning objects available is critical to reuse learning resources. Making content transparently available and providing added value to different stakeholders is among the goals of the European Commission's eContentplus programme. This paper analyses standards and protocols relevant for making learning objects accessible in distributed data…
Descriptors: Foreign Countries, Metadata, Educational Resources, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Judge, Miriam – Irish Educational Studies, 2013
This article discusses the research findings from the start-up phase of an innovative information and communication technology (ICT) project focused on ICT integration as a complex process involving many factors such as leadership, school readiness and organisational culture. Known locally as Hermes, the project's core objective was to provide an…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Leadership
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rupp, Andre A.; Levy, Roy; Dicerbo, Kristen E.; Sweet, Shauna J.; Crawford, Aaron V.; Calico, Tiago; Benson, Martin; Fay, Derek; Kunze, Katie L.; Mislevy, Robert J.; Behrens, John T. – Journal of Educational Data Mining, 2012
In this paper we describe the development and refinement of "evidence rules" and "measurement models" within the "evidence model" of the "evidence-centered design" (ECD) framework in the context of the "Packet Tracer" digital learning environment of the "Cisco Networking Academy." Using…
Descriptors: Computer Networks, Evidence Based Practice, Design, Instructional Design
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mislevy, Robert J.; Behrens, John T.; Dicerbo, Kristen E.; Levy, Roy – Journal of Educational Data Mining, 2012
"Evidence-centered design" (ECD) is a comprehensive framework for describing the conceptual, computational and inferential elements of educational assessment. It emphasizes the importance of articulating inferences one wants to make and the evidence needed to support those inferences. At first blush, ECD and "educational data…
Descriptors: Educational Assessment, Psychometrics, Evidence, Computer Games
Pages: 1  |  ...  |  29  |  30  |  31  |  32  |  33  |  34  |  35  |  36  |  37  |  ...  |  305