Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Algorithms | 9 |
| Computer Networks | 9 |
| Artificial Intelligence | 2 |
| Computer Software | 2 |
| Information Networks | 2 |
| Internet | 2 |
| Literature Reviews | 2 |
| Authors | 1 |
| Bibliometrics | 1 |
| Chaos Theory | 1 |
| Children | 1 |
| More ▼ | |
Source
Author
| Rasmussen, Edie M. | 2 |
| Abhishek Vaish | 1 |
| Amitabh Verma | 1 |
| Dan Li | 1 |
| Diamond, Ted | 1 |
| Huichao Li | 1 |
| Kurtze, Douglas | 1 |
| Mareschal, Denis | 1 |
| Nan Wu | 1 |
| Ravindra Kumar | 1 |
| Samo Bobek | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 9 |
| Reports - Research | 5 |
| Information Analyses | 3 |
| Reports - Descriptive | 3 |
| Opinion Papers | 2 |
| Collected Works - General | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
| Practitioners | 1 |
| Researchers | 1 |
Location
| China | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Nan Wu – International Journal of Web-Based Learning and Teaching Technologies, 2024
Higher education is becoming increasingly competitive and all educational institutions are concentrating on improving quality and changing traditional higher education teaching methods. New-type classroom instruction has embraced a unique advancement opportunity with the arrival of the fifth generation (5G) era. It is critical to develop a…
Descriptors: Instructional Effectiveness, Internet, Computer Literacy, Artificial Intelligence
Amitabh Verma – Journal of Educators Online, 2025
This study provides a thorough bibliometric analysis of the research landscape concerning the application of soft computing in higher education. This study collects 5,140 pieces including books, book chapters, journal articles published in respected journals, and conference papers presented at notable international conferences that were published…
Descriptors: Bibliometrics, Computer Uses in Education, Computer Science, Higher Education
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Peer reviewedRasmussen, Edie M. – Annual Review of Information Science and Technology (ARIST), 1992
Examines parallel computer architecture and the use of parallel processors for text. Topics discussed include parallel algorithms; performance evaluation; parallel information processing; parallel access methods for text; parallel and distributed information retrieval systems; parallel hardware for text; and network models for information…
Descriptors: Algorithms, Computer Networks, Evaluation Methods, Information Processing
Peer reviewedRasmussen, Edie M.; And Others – Information Processing and Management, 1991
This issue contains nine articles that provide an overview of trends and research in parallel information retrieval. Topics discussed include network design for text searching; the Connection Machine System; PThomas, an adaptive information retrieval system on the Connection Machine; algorithms for document clustering; and system architecture for…
Descriptors: Algorithms, Cluster Grouping, Computer Networks, Computer System Design
Snyder, Herbert; Kurtze, Douglas – Proceedings of the ASIS Annual Meeting, 1992
Discusses the use of chaos, or nonlinear dynamics, for investigating computer-mediated communication. A comparison between real, human-generated data from a computer network and similarly constructed random-generated data is made, and mathematical procedures for determining chaos are described. (seven references) (LRW)
Descriptors: Algorithms, Chaos Theory, Comparative Analysis, Computer Networks
Peer reviewedMareschal, Denis; Shultz, Thomas R. – Cognitive Development, 1996
Presents a computational framework for modeling cognitive development that provides a language paradigm with which to compare and contrast different facets of children's knowledge. Describes the generative connectionist algorithm "cascade-correlation," the successful use of the algorithm to model cognitive development in various…
Descriptors: Algorithms, Children, Cognitive Development, Cognitive Measurement
Peer reviewedDiamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks

Direct link
