NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 4,846 to 4,860 of 10,600 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ernst, Jeremy V.; Clark, Aaron C. – Journal of STEM Education: Innovations and Research, 2012
In 2009, the North Carolina Virtual Public Schools worked with researchers at the William and Ida Friday Institute to produce and evaluate the use of game creation by secondary students as a means for learning content related to career awareness in Science, Technology, Engineering and Mathematics (STEM) disciplines, with particular emphasis in…
Descriptors: Computers, Educational Technology, Vocational Education, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ballenger, Robert M. – Information Systems Education Journal, 2010
This case provides a real-world project-oriented case study for students enrolled in a management information systems, database management, or systems analysis and design course in which database design and development are taught. The case consists of a business scenario to provide background information and details of the unique operating…
Descriptors: Database Design, Computer Science Education, Case Method (Teaching Technique), Student Projects
Dong, Xiao – ProQuest LLC, 2010
Workflow technology has emerged as an eminent way to support scientific computing nowadays. Supported by mature technological infrastructures such as web services and high performance computing infrastructure, workflow technology has been well adopted by scientific community as it offers an effective framework to prototype, modify and manage…
Descriptors: Work Environment, Data Processing, Pattern Recognition, Semantics
Caudle, Daryl L. – ProQuest LLC, 2010
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Descriptors: Information Systems, Organizational Change, Telecommunications, Information Technology
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Fan, Quyin – ProQuest LLC, 2010
Program comprehension is the most important and frequent process in software maintenance. Extensive research has found that individual characteristics of programmers, differences of computer programs, and differences of task-driven motivations are the major factors that affect the program comprehension results. There is no study specifically…
Descriptors: Computer Software, Maintenance, Programming, Employees
Ehrlich, Justin – ProQuest LLC, 2010
The application of virtual reality is becoming ever more important as technology reaches new heights allowing virtual environments (VE) complete with global illumination. One successful application of virtual environments is educational interventions meant to treat individuals with autism spectrum disorder (ASD). VEs are effective with these…
Descriptors: Realism, Intervention, Computer Simulation, Autism
Nagasinghe, Iranga – ProQuest LLC, 2010
This thesis investigates and develops a few acceleration techniques for the search engine algorithms used in PageRank and HITS computations. PageRank and HITS methods are two highly successful applications of modern Linear Algebra in computer science and engineering. They constitute the essential technologies accounted for the immense growth and…
Descriptors: Graphs, Search Engines, Engineering, Computer Science
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Basnet, Kul Bahadur; Kim, Jinsoo – Journal of STEM Teacher Education, 2010
The purpose of this study was to assess the Diploma in Computer Engineering (DCE) courses offered at affiliated schools of the Council for Technical Education and Vocational Training (CTEVT) with a focus on the goals of the curriculum and employment opportunities. Document analysis, questionnaires, focus group discussions and semi-structured…
Descriptors: Foreign Countries, Vocational Education, Technical Institutes, Engineering Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bers, Marina U. – Early Childhood Research & Practice, 2010
This article describes the TangibleK robotics program for young children. Based on over a decade of research, this program is grounded on the belief that teaching children about the human-made world, the realm of technology and engineering, is as important as teaching them about the natural world, numbers, and letters. The TangibleK program uses…
Descriptors: Young Children, Computer Science, Engineering, Kindergarten
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sa, Leonardo; Hsin, Wen-Jung – InSight: A Journal of Scholarly Teaching, 2010
Recursion is a concept that can be used to describe the phenomena and natural occurrences in many different fields. As many applications utilize computer software to model recursion, recursion is a particularly important concept in the computing discipline. However, it is a difficult concept for many undergraduate students to master. A Recursion…
Descriptors: Computer Science Education, Undergraduate Students, Programming, Mathematics
Peer reviewed Peer reviewed
Direct linkDirect link
Maloney, John; Resnick, Mitchel; Rusk, Natalie; Silverman, Brian; Eastmond, Evelyn – ACM Transactions on Computing Education, 2010
Scratch is a visual programming environment that allows users (primarily ages 8 to 16) to learn computer programming while working on personally meaningful projects such as animated stories and games. A key design goal of Scratch is to support self-directed learning through tinkering and collaboration with peers. This article explores how the…
Descriptors: Computer Software, Computer Assisted Instruction, Computer Science Education, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Sanborn, Adam N.; Griffiths, Thomas L.; Navarro, Daniel J. – Psychological Review, 2010
Rational models of cognition typically consider the abstract computational problems posed by the environment, assuming that people are capable of optimally solving those problems. This differs from more traditional formal models of cognition, which focus on the psychological processes responsible for behavior. A basic challenge for rational models…
Descriptors: Models, Cognitive Processes, Psychology, Monte Carlo Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Pages: 1  |  ...  |  320  |  321  |  322  |  323  |  324  |  325  |  326  |  327  |  328  |  ...  |  707