NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 496 to 510 of 4,568 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rupp, Andre A.; Levy, Roy; Dicerbo, Kristen E.; Sweet, Shauna J.; Crawford, Aaron V.; Calico, Tiago; Benson, Martin; Fay, Derek; Kunze, Katie L.; Mislevy, Robert J.; Behrens, John T. – Journal of Educational Data Mining, 2012
In this paper we describe the development and refinement of "evidence rules" and "measurement models" within the "evidence model" of the "evidence-centered design" (ECD) framework in the context of the "Packet Tracer" digital learning environment of the "Cisco Networking Academy." Using…
Descriptors: Computer Networks, Evidence Based Practice, Design, Instructional Design
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mislevy, Robert J.; Behrens, John T.; Dicerbo, Kristen E.; Levy, Roy – Journal of Educational Data Mining, 2012
"Evidence-centered design" (ECD) is a comprehensive framework for describing the conceptual, computational and inferential elements of educational assessment. It emphasizes the importance of articulating inferences one wants to make and the evidence needed to support those inferences. At first blush, ECD and "educational data…
Descriptors: Educational Assessment, Psychometrics, Evidence, Computer Games
Yan, Gongjun – ProQuest LLC, 2010
Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…
Descriptors: Confidentiality, Electronic Equipment, Geographic Location, Probability
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, M.-H.; Huang, M.-C.; Ting, Y.-C.; Chen, H.-H.; Li, T.-L. – IEEE Transactions on Education, 2010
In this article, a course on high-frequency wireless communications systems is presented. With the 145-MHz baseband subsystem available from a prerequisite course, the present course emphasizes the design and implementation of the 2.45-GHz front-end subsystem as well as system integration issues. In this curriculum, the 2.45-GHz front-end…
Descriptors: Prerequisites, Laboratories, Telecommunications, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Klemke, Roland; Ternier, Stefaan; Kalz, Marco; Specht, Marcus – British Journal of Educational Technology, 2010
Making learning objects available is critical to reuse learning resources. Making content transparently available and providing added value to different stakeholders is among the goals of the European Commission's eContentplus programme. This paper analyses standards and protocols relevant for making learning objects accessible in distributed data…
Descriptors: Foreign Countries, Metadata, Educational Resources, Computer Networks
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2009
Hiring substitute teachers used to be an early-morning calling burden for staff members at schools in Oregon's Coos Bay School District. Now that work has been passed off to Aesop, a service from Frontline Placement Technologies, which springs into action upon receiving a notification, either by call or log-in, from a teacher reporting an absence.…
Descriptors: Computer Software, School Districts, Educational Technology, Substitute Teachers
Kpaduwa, Fidelis Iheanyi – ProQuest LLC, 2010
This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…
Descriptors: Manufacturing Industry, Correlation, Telecommunications, Data Analysis
Dessoff, Alan – District Administration, 2010
Under pressure to keep spending down but also keep pace with rapid technology changes, many districts are future-proofing their schools--trying to get the most out of their tech spending by providing solutions they will be able to use now and in the future without major, expensive infrastructure overhauls. The idea is growing in popularity across…
Descriptors: School Districts, Elementary Secondary Education, Technological Advancement, Adjustment (to Environment)
Demski, Jennifer – Campus Technology, 2010
As higher education budgets tighten in the ongoing recession, colleges and universities have found themselves questioning, lengthening, and even eliminating tech refresh cycles. Yet how deep an institution cuts into its refresh program can compromise its ability to provide an up-to-date and competitive computing environment for students and a…
Descriptors: Educational Technology, Cost Effectiveness, Information Networks, Technology Planning
Corn, Jenifer O.; Oliver, Kevin M.; Hess, Clara E.; Halstead, Elizabeth O.; Argueta, Rodolfo; Patel, Ruchi K.; Tingen, Jennifer; Huff, Jessica D. – Educational Technology, 2010
Twelve high schools in North Carolina piloted a 1:1 learning initiative, where every student and teacher received a laptop computer with wireless Internet access provided throughout the school. The overall goals of the initiative were to improve teaching practices; increase student achievement; and better prepare students for work, citizenship,…
Descriptors: High Schools, Focus Groups, Student Surveys, Computers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ybarra, Gary A.; Collins, Leslie M.; Huettel, Lisa G.; Brown, April S.; Coonley, Kip D.; Massoud, Hisham Z.; Board, John A.; Cummer, Steven A.; Choudhury, Romit Roy; Gustafson, Michael R.; Jokerst, Nan M.; Brooke, Martin A.; Willett, Rebecca M.; Kim, Jungsang; Absher, Martha S. – Advances in Engineering Education, 2011
The field of electrical and computer engineering has evolved significantly in the past two decades. This evolution has broadened the field of ECE, and subfields have seen deep penetration into very specialized areas. Remarkable devices and systems arising from innovative processes, exotic materials, high speed computer simulations, and complex…
Descriptors: Engineering Education, Undergraduate Study, Career Choice, Curriculum Design
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Villano, Matt – Campus Technology, 2009
Academic technologists at Lynn University (Florida) learned the hard way just how important a disaster recovery plan can be. Back in 2005, when Hurricane Wilma walloped the region with driving rain and 120 mile-per-hour winds, the storm debilitated Lynn's IT department, causing damage and flooding that thwarted the campus network for nearly two…
Descriptors: Emergency Programs, Educational Technology, Information Technology, Internet
Pages: 1  |  ...  |  30  |  31  |  32  |  33  |  34  |  35  |  36  |  37  |  38  |  ...  |  305