Publication Date
In 2025 | 8 |
Since 2024 | 46 |
Since 2021 (last 5 years) | 90 |
Since 2016 (last 10 years) | 276 |
Since 2006 (last 20 years) | 1598 |
Descriptor
Source
Author
Spink, Amanda | 11 |
Marchionini, Gary | 10 |
Alonzo, Julie | 9 |
Tindal, Gerald | 9 |
Barker, Philip | 8 |
Hwang, Gwo-Jen | 7 |
Lai, Cheng Fei | 7 |
Clancey, William J. | 6 |
Dillon, Andrew | 6 |
Tseng, Shian-Shyong | 6 |
Aleven, Vincent | 5 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 110 |
Teachers | 75 |
Media Staff | 38 |
Researchers | 37 |
Administrators | 34 |
Policymakers | 21 |
Students | 10 |
Community | 3 |
Parents | 3 |
Location
United Kingdom | 87 |
Taiwan | 60 |
Australia | 47 |
Canada | 45 |
Spain | 45 |
Germany | 39 |
Pennsylvania | 28 |
Greece | 25 |
United States | 24 |
Turkey | 22 |
European Union | 21 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Emmert-Streib, Frank; Dehmer, Matthias; Lyardet, Fernando – Education Sciences, 2013
Within recent years, there is an increasing need to train students, from biology and beyond, in quantitative methods that are relevant to cope with data-driven biology. Systems Biology is such a field that places a particular focus on the functional aspect of biology and molecular interacting processes. This paper deals with the conceptual design…
Descriptors: Biology, Web Based Instruction, Statistical Analysis, Molecular Biology
Scheuer, O.; McLaren, B. M. – IEEE Transactions on Learning Technologies, 2013
One of the main challenges in tapping the full potential of modern educational software is to devise mechanisms to automatically analyze and adaptively support students' problem solving and learning. A number of such approaches have been developed to teach argumentation skills in domains as diverse as science, the Law, and ethics. Yet,…
Descriptors: Intelligent Tutoring Systems, Persuasive Discourse, Cooperative Learning, Legal Education (Professions)
Bullian, Jeremy; Ellison, Alicia – Journal of Web Librarianship, 2013
When an institutional program review determined the Hillsborough Community College Libraries Web site was out-of-date, lacked resources, and was in desperate need of a makeover, the authors embarked upon a redesign project. The article describes the challenges and considerations that contributed to the authors' decision-making and design…
Descriptors: Community Colleges, Web Sites, Library Services, Library Development
Kwanya, Tom; Stilwell, Christine; Underwood, Peter G. – Journal of Librarianship and Information Science, 2013
Using the "point oh" naming system for developments in librarianship is attracting debate about its appropriateness, basis and syntax and the meaning and potential of Library 2.0. Now a new term, Library 3.0, has emerged. Is there is any significant difference between the two models? Using documentary analysis to explore the terms, the…
Descriptors: Information Networks, Library Automation, Library Development, Library Services
Malik, Kshitiz – ProQuest LLC, 2009
Branch mispredicts have a first-order impact on the performance of integer applications. Control Independence (CI) architectures aim to overlap the penalties of mispredicted branches with useful execution by spawning control-independent work as separate threads. Although control independent, such threads may consume register and memory values…
Descriptors: Computer System Design, Performance, Engineering
Agarwal, Mayank – ProQuest LLC, 2009
The shift of the microprocessor industry towards multicore architectures has placed a huge burden on the programmers by requiring explicit parallelization for performance. Implicit Parallelization is an alternative that could ease the burden on programmers by parallelizing applications "under the covers" while maintaining sequential semantics…
Descriptors: Computers, Computer System Design, Programming
Ackland, Aileen; Swinney, Ann – Research in Learning Technology, 2015
In this paper, we draw on Actor-Network Theories (ANT) to explore how material components functioned to create gateways and barriers to a virtual learning network in the context of a professional development module in higher education. Students were practitioners engaged in family learning in different professional roles and contexts. The data…
Descriptors: Virtual Classrooms, Communities of Practice, Social Networks, Learning Modules
Cundiff, Jacob; McCallum, Taylor; Rich, Andrew; Truax, Michael; Ward, Tamara; Havelka, Douglas – Journal of Information Systems Education, 2015
The launch of HealthCare.gov, the website of the Affordable Care Act (AKA Obamacare), was a major public relations disaster for the Obama administration. This case examines some of the factors that contributed to the failure of the launch and then details how Optum, an information technology service provider, considered the opportunity provided by…
Descriptors: Case Studies, Information Systems, Database Management Systems, Online Vendors
Muñoz González, Juan Manuel; Rubio García, Sebastián; Cruz Pichardo, Ivanovna M. – Digital Education Review, 2015
At the present time, the use of video games goes beyond mere amusement or entertainment due to its potential for developing capacities, dexterity and skills. Thus, video games have extended to environments like that of education, serving as didactic resources within dynamics that respond to the interests and necessities of the 21st century…
Descriptors: Video Games, Classroom Environment, Classroom Techniques, Cooperative Learning
Nair, Uday – E-Learning and Digital Media, 2015
There are two sides to a coin when it comes to implementing technology at universities; on one side, there is the university using technologies via the virtual learning environment that seems to be outdated with the digital needs of the students, and on the other side, while implementing technology at the university learning environment the focus…
Descriptors: Educational Environment, Individualized Programs, Technology Uses in Education, Technology Integration
Glore, Peyton; David, Alicia – International Journal on E-Learning, 2012
This article reviews research pertaining to the use aesthetics design, and usability in education. This article focuses on defining the role of visual elements and aesthetics in the user interface while exploring the importance of their application in a web-based learning environment. Research demonstrates that aesthetics are pivotal in…
Descriptors: Aesthetics, Electronic Learning, Credibility, Web Based Instruction
Lama, Manuel; Vidal, Juan C.; Otero-Garcia, Estefania; Bugarin, Alberto; Barro, Senen – Educational Technology & Society, 2012
Large-sized repositories of learning objects (LOs) are difficult to create and also to maintain. In this paper we propose a way to reduce this drawback by improving the classification mechanisms of the LO repositories. Specifically, we present a solution to automate the LO classification of the Universia repository, a collection of more than 15…
Descriptors: Foreign Countries, Electronic Libraries, Metadata, Programming
Filipowski, Tomasz; Kazienko, Przemyslaw; Brodka, Piotr; Kajdanowicz, Tomasz – Behaviour & Information Technology, 2012
Knowledge exchange between employees is an essential feature of recent commercial organisations on the competitive market. Based on the data gathered by various information technology (IT) systems, social links can be extracted and exploited in knowledge exchange systems of a new kind. Users of such a system ask their queries and the system…
Descriptors: Expertise, Informal Education, Information Technology, Workplace Learning