Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 17 |
Descriptor
| Computers | 17 |
| Data Analysis | 5 |
| Data Processing | 5 |
| Data Collection | 4 |
| Information Technology | 4 |
| Internet | 4 |
| Models | 4 |
| Computer Science | 3 |
| Computer Security | 3 |
| Data | 3 |
| Educational Technology | 3 |
| More ▼ | |
Source
| ProQuest LLC | 17 |
Author
| Anaya, Leticia H. | 1 |
| Babu, Rakesh | 1 |
| Bernier, Jose | 1 |
| Cleveland, Lara L. | 1 |
| Dong, Xiao | 1 |
| Moellinger, Terry | 1 |
| Pfautz, Charles Van Vleck | 1 |
| Ran Tao | 1 |
| Ryan C. Bleile | 1 |
| Shraddha Govind Barke | 1 |
| Sudipta Mondal | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 17 |
Education Level
| Higher Education | 3 |
| Elementary Education | 1 |
| Grade 5 | 1 |
| Grade 6 | 1 |
| Grade 7 | 1 |
| Grade 8 | 1 |
| Middle Schools | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ran Tao – ProQuest LLC, 2023
Vision classification tasks, a fundamental and transformative aspect of deep learning and computer vision, play a pivotal role in our ability to understand the visual world. Deep learning techniques have revolutionized the field, enabling unprecedented accuracy and efficiency in vision classification. However, deep learning models, especially…
Descriptors: Classification, Vision, Documentation, Data Collection
Sudipta Mondal – ProQuest LLC, 2024
Graph neural networks (GNN) are vital for analyzing real-world problems (e.g., network analysis, drug interaction, electronic design automation, e-commerce) that use graph models. However, efficient GNN acceleration faces with multiple challenges related to high and variable sparsity of input feature vectors, power-law degree distribution in the…
Descriptors: Graphs, Models, Computers, Scaling
Shraddha Govind Barke – ProQuest LLC, 2024
The dream of intelligent assistants to enhance programmer productivity has now become a concrete reality, with rapid advances in artificial intelligence. Large language models (LLMs) have demonstrated impressive capabilities in various domains based on the vast amount of data used to train them. However, tasks which require structured reasoning or…
Descriptors: Artificial Intelligence, Symbolic Learning, Programming, Programming Languages
Ryan C. Bleile – ProQuest LLC, 2021
Since near the very beginning of electronic computing, Monte Carlo particle transport has been a fundamental approach for solving computational physics problems. Due to the high computational demands and inherently parallel nature of these applications, Monte Carlo transport applications are often performed in the supercomputing environment. That…
Descriptors: Monte Carlo Methods, Computers, Computer Oriented Programs, Models
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Tyagi, Himanshu – ProQuest LLC, 2013
This dissertation concerns the secure processing of distributed data by multiple terminals, using interactive public communication among themselves, in order to accomplish a given computational task. In the setting of a probabilistic multiterminal source model in which several terminals observe correlated random signals, we analyze secure…
Descriptors: Computation, Correlation, Computers, Data Processing
Thompson, Eleanor Elizabeth – ProQuest LLC, 2014
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…
Descriptors: Information Technology, Information Security, Risk Management, Computers
Anaya, Leticia H. – ProQuest LLC, 2011
In the Information Age, a proliferation of unstructured text electronic documents exists. Processing these documents by humans is a daunting task as humans have limited cognitive abilities for processing large volumes of documents that can often be extremely lengthy. To address this problem, text data computer algorithms are being developed.…
Descriptors: Classification, Data Processing, Mathematics, Accuracy
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Dong, Xiao – ProQuest LLC, 2010
Workflow technology has emerged as an eminent way to support scientific computing nowadays. Supported by mature technological infrastructures such as web services and high performance computing infrastructure, workflow technology has been well adopted by scientific community as it offers an effective framework to prototype, modify and manage…
Descriptors: Work Environment, Data Processing, Pattern Recognition, Semantics
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Thomas, Shailendra Nelle – ProQuest LLC, 2010
Purpose, scope, and method of study: Although computer technology has been a part of the educational community for many years, it is still not used at its optimal capacity (Gosmire & Grady, 2007b; Trotter, 2007). While teachers were identified early as playing important roles in the success of technology implementation, principals were often…
Descriptors: Technology Integration, Computers, Educational Technology, Instructional Leadership
Babu, Rakesh – ProQuest LLC, 2011
The central premise of this research is that blind and visually impaired (BVI) people cannot use the Internet effectively due to accessibility and usability problems. Use of the Internet is indispensable in today's education system that relies on Web-enhanced instruction (WEI). Therefore, BVI students cannot participate effectively in WEI. Extant…
Descriptors: Web Based Instruction, Visual Impairments, Internet, Academic Accommodations (Disabilities)
Pfautz, Charles Van Vleck – ProQuest LLC, 2010
Computer assisted guidance systems may adapt well to various models of academic advising, and they have the ability to address the challenge of meeting the diverse advising needs of community college students without sacrificing the integrity of academic advising (Fowkes & McWhirter, 2007). The purpose of this qualitative case study was to assess…
Descriptors: Required Courses, College Students, Career Planning, Intervention
Moellinger, Terry – ProQuest LLC, 2010
This study examines the contemporary user patterns that emerged when a new medium--the personal computer and the Internet--was introduced into the user's media ecology. The study focuses on the introductory period and current usage. Data analysis conformed to practices accepted by oral historians (Richie, 2003, and Brundage, 2008), and grounded…
Descriptors: Grounded Theory, Computers, Ecology, Data Analysis
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
