NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 5,041 to 5,055 of 7,848 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Kordaki, Maria – Computers & Education, 2010
This paper presents both the design and the pilot formative evaluation study of a computer-based problem-solving environment (named LECGO: Learning Environment for programming using C using Geometrical Objects) for the learning of computer programming using C by beginners. In its design, constructivist and social learning theories were taken into…
Descriptors: Feedback (Response), Constructivism (Learning), Formative Evaluation, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Tangney, Brendan; Oldham, Elizabeth; Conneely, Claire; Barrett, Stephen; Lawlor, John – IEEE Transactions on Education, 2010
This paper describes a model for computer programming outreach workshops aimed at second-level students (ages 15-16). Participants engage in a series of programming activities based on the Scratch visual programming language, and a very strong group-based pedagogy is followed. Participants are not required to have any prior programming experience.…
Descriptors: Foreign Countries, Computer Software, Programming Languages, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Tenenberg, Josh; McCartney, Robert – Journal on Educational Resources in Computing, 2007
This issue is devoted to the curriculum guidelines from the Liberal Arts Computer Science Consortium. These guidelines provide a coherent and important model for computing education within a liberal arts context, giving primacy to critical reason, rigorous methods, and student engagement in the research process. In this regard, they are at the…
Descriptors: Guidelines, Computer Science, Liberal Arts, College Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Armoni, Michal; Gal-Ezer, Judith – Computer Science Education, 2007
Non-determinism is one of the most important, yet abstract, recurring concepts of Computer Science. It plays an important role in Computer Science areas such as formal language theory, computability theory, distributed computing, and operating systems. We conducted a series of studies on the perception of non-determinism. In the current research,…
Descriptors: Computer Science, Scientific Concepts, Computer Science Education, Abstract Reasoning
Peer reviewed Peer reviewed
Direct linkDirect link
Castro-Schez, J. J.; del Castillo, E.; Hortolano, J.; Rodriguez, A. – IEEE Transactions on Education, 2009
Educational software tools are considered to enrich teaching strategies, providing a more compelling means of exploration and feedback than traditional blackboard methods. Moreover, software simulators provide a more motivating link between theory and practice than pencil-paper methods, encouraging active and discovery learning in the students.…
Descriptors: Foreign Countries, Computer Software, Data Analysis, Web Based Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Cox, G. W.; Hughes, W. E., Jr.; Etzkorn, L. H.; Weisskopf, M. E. – IEEE Transactions on Education, 2009
This paper presents the results of an analysis of indicators that can be used to predict whether a student will succeed in a Computer Science Ph.D. program. The analysis was conducted by studying the records of 75 students who have been in the Computer Science Ph.D. program of the University of Alabama in Huntsville. Seventy-seven variables were…
Descriptors: Case Studies, Prediction, Computer Science Education, Doctoral Degrees
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Hsinchun; Li, Xin; Chau, M.; Ho, Yi-Jen; Tseng, Chunju – IEEE Transactions on Education, 2009
With the advent of the World Wide Web, many business applications that utilize data mining and text mining techniques to extract useful business information on the Web have evolved from Web searching to Web mining. It is important for students to acquire knowledge and hands-on experience in Web mining during their education in information systems…
Descriptors: Class Activities, Information Systems, Internet, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ritzhaupt, Albert D. – ACM Transactions on Computing Education, 2009
This article provides an overview of the challenges in implementing a game development course with limited resources in computing curricula. An approach to a holistic game development course is outlined in terms of its organization, software, and instructional methods. The course had 23 students enrolled in its first offering and was…
Descriptors: Educational Strategies, Reliability, Cooperative Learning, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Caspersen, Michael E.; Kolling, Michael – ACM Transactions on Computing Education, 2009
Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based---they may know what the individual programming language constructs are, but they do not know how to put them together. Despite this fact, textbooks, educational…
Descriptors: Programming Languages, Computer Software, Educational Practices, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Dyson, Laurel Evelyn; Litchfield, Andrew; Lawrence, Elaine; Raban, Ryszard; Leijdekkers, Peter – Australasian Journal of Educational Technology, 2009
This article reports on an m-learning research agenda instituted at our university in order to explore how mobile technology can enhance active, experiential learning. Details of the implementation and results of four areas of m-learning are presented: mobile supported fieldwork, fostering interactivity in large lectures with mobile technology,…
Descriptors: Experiential Learning, Case Studies, Program Implementation, Curriculum Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Paz, Tamar; Leron, Uri – Journal for Research in Mathematics Education, 2009
Functions are all around us, disguised as actions on concrete objects. Composition of functions, too, is all around us, because these actions can be performed in succession, the output of one serving as the input for the next. In terms of Gray and Tall's (2001) "embodied objects" or Lakoff and Nunez's (2000) "mathematical idea…
Descriptors: Concept Formation, Mathematics Instruction, Mathematical Concepts, Algebra
Pages: 1  |  ...  |  333  |  334  |  335  |  336  |  337  |  338  |  339  |  340  |  341  |  ...  |  524