Publication Date
| In 2026 | 2 |
| Since 2025 | 446 |
| Since 2022 (last 5 years) | 2034 |
| Since 2017 (last 10 years) | 4007 |
| Since 2007 (last 20 years) | 6153 |
Descriptor
Source
Author
| Barnes, Tiffany | 22 |
| Armoni, Michal | 18 |
| Yadav, Aman | 17 |
| Gal-Ezer, Judith | 16 |
| Malmi, Lauri | 15 |
| Xinogalos, Stelios | 15 |
| Soh, Leen-Kiat | 14 |
| Frydenberg, Mark | 13 |
| Hazzan, Orit | 13 |
| Kafai, Yasmin B. | 13 |
| Howe, Richard D. | 12 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 724 |
| Teachers | 402 |
| Researchers | 151 |
| Policymakers | 97 |
| Administrators | 71 |
| Students | 66 |
| Media Staff | 11 |
| Parents | 9 |
| Community | 6 |
| Counselors | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| Turkey | 252 |
| Australia | 167 |
| United Kingdom | 153 |
| Canada | 131 |
| China | 118 |
| Taiwan | 118 |
| California | 115 |
| United States | 96 |
| Germany | 90 |
| Spain | 81 |
| Finland | 78 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Veletsianos, George; Heller, Robert; Overmyer, Scott; Procter, Mike – British Journal of Educational Technology, 2010
This paper examines the effective deployment of conversational agents in virtual worlds from the perspective of researchers/practitioners in cognitive psychology, computing science, learning technologies and engineering. From a cognitive perspective, the major challenge lies in the coordination and management of the various channels of information…
Descriptors: Cues, Engineering, Cognitive Psychology, Internet
Pavlekovic, Margita, Ed.; Kolar-Begovic, Zdenka, Ed.; Kolar-Super, Ruzica, Ed. – Online Submission, 2013
The universities and faculties which educate teachers of mathematics for teaching pupils/students of any age group from pre-school age to higher education carefully monitor and compare valuable results of this research, detect the areas in which the mathematical achievements of pupils should be improved at the national level and propose the ways…
Descriptors: Operations Research, Geometric Concepts, Foreign Countries, Mathematics Instruction
Tedre, Matti – Journal of Information Technology Education, 2007
The diversity and interdisciplinarity of computer science and the multiplicity of its uses in other sciences make it hard to define computer science and to prescribe how computer science should be carried out. The diversity of computer science also causes friction between computer scientists from different branches. Computer science curricula, as…
Descriptors: Critical Reading, Scientific Concepts, Computer Science, Engineering
Kazim, Nida; Schmidt, Klaus; Brown, Dan – Journal of Industrial Teacher Education, 2007
Fewer women than men are involved in the fields of computer science and in other computer-related technology areas. In the United States, fewer than twenty percent of graduates of those programs are female. Fisher & Margolis (2002) say that despite the rise of a women's movement, women have lost ground in the world of computing. This is not…
Descriptors: Females, Career Choice, College Administration, Computer Science
Peer reviewedBailey, Daniel E.; Polson, Peter G. – American Psychologist, 1975
An account of the development of the Computer Laboratory for Instruction in Psychological Research (CLIPR) which was established in the Department of Psychology at the University of Colorado in 1970. It was designed to bridge the gap between the model of the institutional computer-center service with a widely distributed clientele and the model of…
Descriptors: Behavioral Science Research, Computer Assisted Instruction, Computer Oriented Programs, Computer Science
National Inst. of Education (ED), Washington, DC. – 1981
The material presents: (1) an overview of the Regional Conferences (2) a paper on Mathematics, Microelectronics, and American Education (F. James Rutherford and Joseph M. Dasbach), and (3) individual presentations on the Regional Meetings in Berkeley, Chicago, Newton, Massachusetts, and Washington, D.C. The meetings were designed to encourage…
Descriptors: Computer Science, Computer Science Education, Computers, Conferences
Rheinboldt, Werner C. – 1980
This material contains two units which view applications of computer science. The first of these examines Horner's scheme; and is designed to instruct the user on how to apply both this scheme and related algorithms. The second unit aims for student understanding of standard bisection, secant, and Newton methods of root finding and appreciation of…
Descriptors: Algorithms, College Mathematics, Computer Programs, Computer Science
Gillespie, Robert G.; Dicaro, Deborah A. – 1981
As the applications of computing have expanded, the issues of computing and higher education have enlarged to include questions about the nature of information transfer on campus and the role of higher education in an information society. A broad view of the national issues and opportunities of computing in higher education is presented. A panel…
Descriptors: College Role, Computer Science, Computer Science Education, Cooperative Planning
Oregon Univ., Eugene. Dept. of Computer Science. – 1974
A lack of comprehensive up-to-date textbooks designed specifically for use in the computers in the education field motivated the development of this resource handbook. There are major sections entitled: computers in education; teaching about computers; the computer as an aid to learning; the computer as a teacher; the computer as a classroom…
Descriptors: Computer Oriented Programs, Computer Programs, Computer Science, Computer Science Education
Peer reviewedNorberg, Arthur L., Comp.; Aspray, William, Comp. – Journal of Computers in Mathematics and Science Teaching, 1988
Contains annotations for resources on the history of computing. Includes resources for technical computing history, general computing history, precomputer era, the impact of computing and series. (CW)
Descriptors: Annotated Bibliographies, Artificial Intelligence, Computer Science, Computer Science Education
Peer reviewedKonvalina, John; And Others – AEDS Journal, 1983
Examines the effects of high school performance, high school and university mathematics background, previous computer experience, and age on computer science aptitude and achievement as measured by a computer science aptitude test and final exam respectively. Methodology and analysis of results by stepwise regression are presented. (EAO)
Descriptors: Academic Achievement, Academic Aptitude, Aptitude Tests, Computer Science
Peer reviewedDessy, Raymond E., Ed. – Analytical Chemistry, 1982
Discusses five approaches used by industry/colleges to provide local area network (LAN) capabilities in the analytical laboratory: (1) mixed baseband bus network coupled to a star net; (2) broadband bus network; (3) ring network; (4) star network coupled to broadband net; and (5) simple multiprocessor center. Part I (September issue) focused on…
Descriptors: Chemistry, College Science, Communications, Computer Programs
Ricks, John – Technological Horizons in Education, 1988
Points out that mainframe computer users today can make their requirements known to the computer in simple English. Provides a listing of fourth generation computer language advantages over third generation languages. Summarizes a program to streamline faculty records on a mainframe computer. (MVL)
Descriptors: Artificial Languages, College Science, Computer Science, Computer Science Education
Garvin-Doxas, Kathy; Barker, Lecia J. – Journal on Educational Resources in Computing, 2004
All learning environments are characterized by numerous communication and interaction practices, which lend themselves to an overall characterization of the climate as defensive or supportive. A case study of public communication and interaction in a large, research-intensive university's first year computer science courses illustrates a learning…
Descriptors: Communication (Thought Transfer), Females, Interaction, Computer Science
Prichard, Janet J.; MacDonald, Laurie E. – Journal of Information Technology Education, 2004
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Descriptors: Terrorism, Textbooks, Computer Security, Public Agencies

Direct link
