NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 346 to 360 of 4,561 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Uysal, Murat Pasa – Interactive Learning Environments, 2016
Various methods and tools have been proposed to overcome the learning obstacles for Object-Oriented Programming (OOP). However, it remains difficult especially for novice learners. The problem may be not only adopting an instructional method, but also an Integrated Development Environment (IDE). Learners employ IDEs as a means to solve programming…
Descriptors: Evaluation, Educational Environment, Cognitive Processes, Difficulty Level
Peer reviewed Peer reviewed
Direct linkDirect link
Sarkar, Nurul I. – International Journal of Web-Based Learning and Teaching Technologies, 2013
Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It…
Descriptors: Telecommunications, Computer Networks, Undergraduate Students, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Rabkin, Ariel; Reiss, Charles; Katz, Randy; Patterson, David – ACM Transactions on Computing Education, 2013
We describe our experiences teaching MapReduce in a large undergraduate lecture course using public cloud services and the standard Hadoop API. Using the standard API, students directly experienced the quality of industrial big-data tools. Using the cloud, every student could carry out scalability benchmarking assignments on realistic hardware,…
Descriptors: Assignments, Undergraduate Study, Computer Networks, Educational Technology
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Wang, Wei – ProQuest LLC, 2010
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Descriptors: Computer Networks, Computer Security, Graphs, Evaluation Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Peer reviewed Peer reviewed
Direct linkDirect link
Burnett, Cathy – E-Learning and Digital Media, 2011
In contributing to understanding about the barriers and opportunities associated with new technologies in educational settings, this article explores dimensions of the educational spaces associated with using networked technologies in contemporary classrooms. After considering how educational spaces may be "produced" (to use Lefebvre's…
Descriptors: Educational Technology, Space Utilization, Educational Environment, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Kanellopoulos, Dimitris N. – Program: Electronic Library and Information Systems, 2011
Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…
Descriptors: Multimedia Materials, Computer Oriented Programs, Computer Networks, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Pazdrowski, Tomasz – ProQuest LLC, 2013
Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…
Descriptors: Innovation, Resistance to Change, Internet, Adoption (Ideas)
Peer reviewed Peer reviewed
Direct linkDirect link
Landwehr, Peter; Spraragen, Marc; Ranganathan, Balki; Carley, Kathleen M.; Zyda, Michael – Simulation & Gaming, 2013
In this article, the authors discuss the development of the "Sudan Game," an interactive model of the country in the time period leading up to the Sudanese referendum on the secession of the South. While many simulations are designed to educate about their subjects, the "Sudan Game" is intended to be a prototype for policy…
Descriptors: Foreign Countries, Computer Games, Public Policy, Policy Formation
Schaffhauser, Dian – Campus Technology, 2012
Putting a CIO and a lawyer together in the same room may give one the start of a pretty decent joke, but it could also save an institution millions of dollars in legal fees. While the IT chief understands the systems that fall under the purview of compliance, the attorney is the go-to pessimist for identifying the "gotcha" elements when it comes…
Descriptors: Legal Problems, Compliance (Legal), Legal Responsibility, Information Technology
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Rangan, Prahalad – ProQuest LLC, 2010
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
Descriptors: Computer Security, Topology, Computer Networks, Computers
Srinivasan, Satish Mahadevan – ProQuest LLC, 2010
Data Aggregation (DA) is a set of functions that provide components of a distributed system access to global information for purposes of network management and user services. With the diverse new capabilities that networks can provide, applicability of DA is growing. DA is useful in dealing with multi-value domain information and often requires…
Descriptors: Data, Computer Networks, Computer Security, Access to Information
Pages: 1  |  ...  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  ...  |  305