NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 4,801 to 4,815 of 10,824 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Berglund, Anders; Eckerdal, Anna; Pears, Arnold; East, Philip; Kinnunen, Paivi; Malmi, Lauri; McCartney, Robert; Mostrom, Jan-Erik; Murphy, Laurie; Ratcliffe, Mark; Schulte, Carsten; Simon, Beth; Stamouli, Ioanna; Thomas, Lynda – European Journal of Engineering Education, 2009
This phenomenographic study opens the classroom door to investigate teachers' experiences of students learning difficult computing topics. Three distinct themes are identified and analysed. "Why" do students succeed or fail to learn these concepts? "What" actions do teachers perceive will ameliorate the difficulties facing…
Descriptors: Foreign Countries, Computer Science, Phenomenology, Teacher Attitudes
Chen, Hong – ProQuest LLC, 2009
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Descriptors: Computer Security, Computer Science, Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Arguedas, Marta; Daradoumis, Thanasis; Xhafa, Fatos – Educational Technology & Society, 2016
Considering social and emotional competence in learning, "emotion awareness" aims to detect the emotions that students show during their learning interactions and make these emotions explicit to them. Being aware of their emotions, students become more conscious of their situation, what may prompt them to behavioral change. The main goal…
Descriptors: Student Motivation, Emotional Response, Self Concept, Consciousness Raising
Peer reviewed Peer reviewed
Direct linkDirect link
Pellas, Nikolaos; Peroutseas, Efstratios – Journal of Educational Computing Research, 2016
While pedagogical and technological affordances of three-dimensional (3D) multiuser virtual worlds in various educational disciplines are largely well-known, a study about their effect on high school students' engagement in introductory programming courses is still lacking. This case study presents students' opinions about their participation in a…
Descriptors: High School Students, Educational Games, Computer Simulation, Simulated Environment
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smarkusky, Debra L.; Toman, Sharon A. – Information Systems Education Journal, 2014
Students in computer science and information technology should be engaged in solving real-world problems received from government and industry as well as those that expose them to various areas of application. In this paper, we discuss interdisciplinary project experiences between majors and non-majors that offered a creative and innovative…
Descriptors: Interdisciplinary Approach, Cooperative Learning, Student Projects, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Straub, Jeremy; Whalen, David – Education Sciences, 2014
The value of the duration of participation in a small spacecraft program has not previously been sufficiently characterized. This work seeks to determine whether most relevant benefits are received by participants quickly (suggesting that participant education would be best achieved by shorter duration exposure to multiple domains) or accrues over…
Descriptors: Program Length, Time Factors (Learning), Time on Task, Student Experience
Peer reviewed Peer reviewed
Direct linkDirect link
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ibáñez, Maria-Blanca; Di-Serio, Ángela; Delgado-Kloos, Carlos – IEEE Transactions on Learning Technologies, 2014
Gamification is the use of game design elements in non-game settings to engage participants and encourage desired behaviors. It has been identified as a promising technique to improve students' engagement which could have a positive impact on learning. This study evaluated the learning effectiveness and engagement appeal of a gamified learning…
Descriptors: Educational Games, Educational Technology, Technology Uses in Education, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nicolson, Margaret; Harper, Felicity – International Journal of Teaching and Learning in Higher Education, 2014
In this article the authors compare two phases of an ongoing, annual online peer observation project at the Open University. Adopting a non-managerialist approach, the project aims to give teachers a renewed sense of collegiality, allowing them to take responsibility for aspects of their professional development and share practice points. While…
Descriptors: Peer Evaluation, Observation, Open Universities, Classroom Observation Techniques
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Parris, Joan B.; Beaver, Jana P.; Nickels, David W.; Crabtree, John D. – Information Systems Education Journal, 2011
Research shows that during times of economic downturn in the United States, education funding suffers. One method that higher education administrators are choosing to ease the economic crunch is to offer hybrid classes that blend one regular face-to-face class meeting with online and outside class components. The challenge of managing large…
Descriptors: Information Systems, Computer Science Education, Learner Engagement, Blended Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Coleman, Phillip; Atkinson, J. Kirk; Thrasher, Evelyn – Journal of Instructional Pedagogies, 2011
The purpose of this study is to investigate the differences between genders on the scores of a series of spreadsheet projects in a survey computer information systems course. This study hypothesizes that there will be significance in scores in the ten assigned projects between female students and males students; with the female students scoring…
Descriptors: Gender Differences, Scores, Information Systems, Spreadsheets
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rinderknecht, Christian – Informatics in Education, 2011
When first introduced to the analysis of algorithms, students are taught how to assess the best and worst cases, whereas the mean and amortized costs are considered advanced topics, usually saved for graduates. When presenting the latter, aggregate analysis is explained first because it is the most intuitive kind of amortized analysis, often…
Descriptors: Computation, Computer Software, Undergraduate Study, Teaching Methods
Parakh, Abhishek – ProQuest LLC, 2011
Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…
Descriptors: Computers, Information Storage, Information Dissemination, Mathematics
Peer reviewed Peer reviewed
Direct linkDirect link
Pigliucci, Massimo; Boudry, Maarten – Science & Education, 2011
Genes are often described by biologists using metaphors derived from computational science: they are thought of as carriers of information, as being the equivalent of "blueprints" for the construction of organisms. Likewise, cells are often characterized as "factories" and organisms themselves become analogous to machines. Accordingly, when the…
Descriptors: Criticism, Genetics, Biology, Figurative Language
Peer reviewed Peer reviewed
Direct linkDirect link
Jing,Lei; Cheng, Zixue; Wang, Junbo; Zhou, Yinghui – IEEE Transactions on Education, 2011
Embedded system technologies are undergoing dramatic change. Competent embedded system engineers are becoming a scarce resource in the industry. Given this, universities should revise their specialist education to meet industry demands. In this paper, a spirally tight-coupled step-by-step educational method, based on an analysis of industry…
Descriptors: Computer Science, Computer System Design, Engineering, Technical Occupations
Pages: 1  |  ...  |  317  |  318  |  319  |  320  |  321  |  322  |  323  |  324  |  325  |  ...  |  722