NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 4,996 to 5,010 of 10,827 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Zendler, Andreas; Spannagel, Christian – Journal on Educational Resources in Computing, 2008
The design of computer science curricula should rely on central concepts of the discipline rather than on technical short-term developments. Several authors have proposed lists of basic concepts or fundamental ideas in the past. However, these catalogs were based on subjective decisions without any empirical support. This article describes the…
Descriptors: Computer Science Education, Computers, Multivariate Analysis, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Chiu, Chiung-Fang; Lee, Greg C. – Computers & Education, 2009
The current practice of traditional in-class lecture for learning computer science (CS) in the high schools of Taiwan is in need of revamping. Teachers instruct on the use of commercial software instead of teaching CS concepts to students. The lack of more suitable teaching materials and limited classroom time are the main reasons for the…
Descriptors: High Schools, Computer Science, Foreign Countries, Lecture Method
Association Supporting Computer Users in Education, 2017
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Computer Software, Conferences (Gatherings)
Peer reviewed Peer reviewed
Direct linkDirect link
Van Name, Barry – Tech Directions, 2012
There is a battlefield where no quarter is given, no mercy shown, but not a single drop of blood is spilled. It is an arena that witnesses the bringing together of high-tech design and manufacture with the outpouring of brute force, under the remotely accessed command of some of today's brightest students. This is the world of battling robots, or…
Descriptors: Females, Engineering, Computer Assisted Design, High School Students
Ballera, Melvin; Elssaedi, Mosbah Mohamed – Association for the Advancement of Computing in Education, 2012
There is an unrealized potential in the use of socially-oriented pedagogical agent and interactive simulation in e-learning system. In this paper, we investigate the impact of having a socially oriented tutor agent and the incorporation of interactive simulation in e-learning into student performances, perceptions and experiences for non-native…
Descriptors: Simulation, Foreign Countries, Computer Science, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Boustedt, Jonas – Computer Science Education, 2012
The software industry needs well-trained software designers and one important aspect of software design is the ability to model software designs visually and understand what visual models represent. However, previous research indicates that software design is a difficult task to many students. This article reports empirical findings from a…
Descriptors: Foreign Countries, Computer Software, Computer Science Education, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Todorovich, E.; Marone, J. A.; Vazquez, M. – IEEE Transactions on Education, 2012
Due to significant technological advances and industry requirements, many universities have introduced programmable logic and hardware description languages into undergraduate engineering curricula. This has led to a number of logistical and didactical challenges, in particular for computer science students. In this paper, the integration of some…
Descriptors: Engineering Education, Computer Science Education, Programming, Electronics
Peer reviewed Peer reviewed
Direct linkDirect link
Denner, Jill; Werner, Linda; Ortiz, Eloy – Computers & Education, 2012
Computer game programming has been touted as a promising strategy for engaging children in the kinds of thinking that will prepare them to be producers, not just users of technology. But little is known about what they learn when programming a game. In this article, we present a strategy for coding student games, and summarize the results of an…
Descriptors: Females, Computer Uses in Education, Computers, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Freiermuth, Mark, Ed.; Zarrinabadi, Nourollah, Ed. – New Language Learning and Teaching Environments, 2020
This edited volume brings together large-scale research as well as case studies from a range of geographical contexts and represents a variety of educational settings involving second language learners and users. Its aim is to explore the interrelated issues of psychology and technology use in second language learning settings as well as in more…
Descriptors: Second Language Learning, Second Language Instruction, Case Studies, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Battig, Michael E. – Information Systems Education Journal, 2010
Survey results from a two year project are presented. The survey instruments were developed through review of the literature involving similar studies of student perceptions and with the assistance of social scientists. The study includes both high school and college student perceptions of computing. The survey also contrasts student perceptions…
Descriptors: High School Students, Computer Attitudes, Computer Science, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mannila, Linda – Informatics in Education, 2010
In this paper, we analyze the errors novice students make when developing invariant based programs. In addition to presenting the general error types, we also look at what students have difficulty with when it comes to expressing invariants. The results indicate that an introductory course utilizing the invariant based approach is suitable from…
Descriptors: Novices, Error Patterns, Difficulty Level, Introductory Courses
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Bajracharya, Sushil Krishna – ProQuest LLC, 2010
Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…
Descriptors: Semantics, Search Engines, Engines, Measures (Individuals)
Peng, Yefei – ProQuest LLC, 2010
An ontology mapping neural network (OMNN) is proposed in order to learn and infer correspondences among ontologies. It extends the Identical Elements Neural Network (IENN)'s ability to represent and map complex relationships. The learning dynamics of simultaneous (interlaced) training of similar tasks interact at the shared connections of the…
Descriptors: Training Methods, Genealogy, Logical Thinking, Cognitive Processes
Pages: 1  |  ...  |  330  |  331  |  332  |  333  |  334  |  335  |  336  |  337  |  338  |  ...  |  722