Publication Date
| In 2026 | 1 |
| Since 2025 | 719 |
| Since 2022 (last 5 years) | 3569 |
| Since 2017 (last 10 years) | 7435 |
| Since 2007 (last 20 years) | 15019 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2852 |
| Teachers | 2010 |
| Researchers | 608 |
| Administrators | 473 |
| Media Staff | 268 |
| Students | 245 |
| Policymakers | 202 |
| Parents | 78 |
| Counselors | 33 |
| Support Staff | 22 |
| Community | 21 |
| More ▼ | |
Location
| Australia | 499 |
| United Kingdom | 474 |
| Turkey | 472 |
| Canada | 364 |
| China | 309 |
| Taiwan | 248 |
| United States | 228 |
| Indonesia | 222 |
| Spain | 221 |
| California | 195 |
| Germany | 163 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 11 |
| Meets WWC Standards with or without Reservations | 16 |
| Does not meet standards | 17 |
Fitzmier, Jack – Educational Technology, 2012
The American Academy of Religion, in concert with the Sakai Foundation, has envisioned a scholarly use of the new Sakai Open Academic Environment open-source software. Currently working under the title "Biosphere," the program would put a rich collection of collaborative tools in the hands of AAR members, their colleagues in related scholarly…
Descriptors: College Faculty, Cooperation, Computer Software, Open Source Technology
Baker, Ryan S. J. d.; Gowda, Sujith M.; Wixon, Michael; Kalka, Jessica; Wagner, Angela Z.; Salvi, Aatish; Aleven, Vincent; Kusbit, Gail W.; Ocumpaugh, Jaclyn; Rossi, Lisa – International Educational Data Mining Society, 2012
In recent years, the usefulness of affect detection for educational software has become clear. Accurate detection of student affect can support a wide range of interventions with the potential to improve student affect, increase engagement, and improve learning. In addition, accurate detection of student affect could play an essential role in…
Descriptors: Academic Achievement, Algebra, Tutors, Computer Software
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
Zuppiroli, Sara; Ciancarini, Paolo; Gabbrielli, Maurizio – IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012
Software product line development refers to software engineering practices and techniques for creating families of similar software systems from a basic set of reusable components, called shared assets. Teaching how to deal with software product lines in a university lab course is a challenging task, because there are several practical issues that…
Descriptors: Engineering, Undergraduate Study, Foreign Countries, Computer Software
Adams, Catherine – Educational Media and Technology Yearbook, 2012
This hermeneutic phenomenological study explores students' and teachers' lived experiences of digital media technologies in the classroom. Using PowerPoint, the research investigates how software selectively extends but also constrains what a student sees, experiences and has access to, as well as how it enhances but also shapes a teacher's…
Descriptors: Educational Technology, Technology Uses in Education, Computer Software, Student Experience
Ross, Andrew M. – College Mathematics Journal, 2012
To compute the probability of having a disease, given a positive test result, is a standard probability problem. The sensitivity and specificity of the test must be given and the prevalence of the disease. We ask how a test-maker might determine the tradeoff between sensitivity and specificity. Adding hypothetical costs for detecting or failing to…
Descriptors: Diseases, Probability, Bayesian Statistics, Test Construction
Heslep, Robert D. – Studies in Philosophy and Education, 2012
The computer engineers who refer to the education of computers do not have a definite idea of education and do not bother to justify the fuzzy ones to which they allude. Hence, they logically cannot specify the features a computer must have in order to be educable. This paper puts forth a non-standard, but not arbitrary, concept of education that…
Descriptors: Artificial Intelligence, Computers, Computer Software, Human Factors Engineering
Frances, J.; Perez-Molina, M.; Bleda, S.; Fernandez, E.; Neipp, C.; Belendez, A. – IEEE Transactions on Education, 2012
Interference and diffraction of light are elementary topics in optics. The aim of the work presented here is to develop an accurate and cheap optical-system simulation software that provides a virtual laboratory for studying the effects of propagation in both time and space for the near- and far-field regions. In laboratory sessions, this software…
Descriptors: Engineering Education, Optics, Computer Software, Computer Simulation
Mariani, Leonardo; Micucci, Daniela – ACM Transactions on Computing Education, 2012
In academic courses, students frequently take advantage of someone else's work to improve their own evaluations or grades. This unethical behavior seriously threatens the integrity of the academic system, and teachers invest substantial effort in preventing and recognizing plagiarism. When students take examinations requiring the production of…
Descriptors: Plagiarism, Integrity, Program Effectiveness, Internet
Ferrari, Pier Alda; Barbiero, Alessandro – Multivariate Behavioral Research, 2012
The increasing use of ordinal variables in different fields has led to the introduction of new statistical methods for their analysis. The performance of these methods needs to be investigated under a number of experimental conditions. Procedures to simulate from ordinal variables are then required. In this article, we deal with simulation from…
Descriptors: Data, Statistical Analysis, Sampling, Simulation
Goldsborough, Reid – Education Digest: Essential Readings Condensed for Quick Review, 2012
If one buys a new PC, laptop, or netbook computer today, it probably comes preloaded with Microsoft Office 2010 Starter Edition. This is a significantly limited, advertising-laden version of Microsoft's suite of productivity programs, Microsoft Office. This continues the trend of PC makers providing ever more crippled versions of Microsoft's…
Descriptors: Computer Software, Educational Technology, Computers, Users (Information)
Kores, Jaroslav – Physics Teacher, 2012
The concept of "perpetual motion" has a long history. The Indian astronomer and mathematician Bhaskara II (12th century) was the first person to describe a perpetual motion (PM) machine. An example of a 13th-century PM machine is shown in Fig. 1. Although the law of conservation of energy clearly implies the impossibility of PM construction, over…
Descriptors: Physics, Motion, Energy, Equipment
Megnigbeto, Eustache – Program: Electronic Library and Information Systems, 2012
Purpose: ABCD is a web-based open and free software suite for library management derived from the UNESCO CDS/ISIS software technology. The first version was launched officially in December 2009 with a MARC 21 bibliographic format database. This paper aims to detail the building of the UNIMARC bibliographic format database for ABCD.…
Descriptors: Bibliographic Databases, Cataloging, Computer Software, Open Source Technology
Hsiao, I-Han; Brusilovsky, Peter – British Journal of Educational Technology, 2011
This paper explores a new approach to engage students in authoring educational content. This approach was implemented in AnnotEx (Example Annotator) system, which allows students to annotate computer programming examples with line-by-line explanations and review annotations produced by their peers. A controlled study of AnnotEx presented in this…
Descriptors: Feedback (Response), Peer Evaluation, Community, Educational Technology

Direct link
Peer reviewed
