NotesFAQContact Us
Collection
Advanced
Search Tips
Source
ProQuest LLC450
Audience
Laws, Policies, & Programs
Higher Education Act Title IX1
What Works Clearinghouse Rating
Showing 316 to 330 of 450 results Save | Export
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Craig, Cecilia Dosh-Bluhm – ProQuest LLC, 2014
The fields of engineering, computer science, and physics have a paucity of women despite decades of intervention by universities and organizations. Women's graduation rates in these fields continue to stagnate, posing a critical problem for society. This qualitative grounded theory (GT) study sought to understand how robotics programs influenced…
Descriptors: Robotics, Science Education, Females, Career Choice
Lewis, Colleen Marie – ProQuest LLC, 2012
To meet a growing demand and a projected deficit in the supply of computer professionals (NCWIT, 2009), it is of vital importance to expand students' access to computer science. However, many researchers in the computer science education community unproductively assume that some students lack an innate ability for computer science and…
Descriptors: Computer Science Education, Prior Learning, Novices, Programming
Stange, Melissa – ProQuest LLC, 2012
Previous studies have examined the curricula of information systems technology (IST) programs, and some have noted a discrepancy between the stated needs of industry and the skills and attributes of graduates of 4-year programs. In addition, gaps between the 2-year curricula and the perceived needs of employers have been noted. The purpose of this…
Descriptors: Curriculum Evaluation, Information Systems, Information Technology, Associate Degrees
Hundley, Jacqueline Holliday – ProQuest LLC, 2012
Although the two-year curriculum guide includes coverage of all eight software engineering core topics, the computer science courses taught in Alabama community colleges limit student exposure to the programming, or coding, phase of the software development lifecycle and offer little experience in requirements analysis, design, testing, and…
Descriptors: Community Colleges, College Curriculum, Computer Science Education, Computer Software
Basawapatna, Ashok Ram – ProQuest LLC, 2012
Computational thinking aims to outline fundamental skills from computer science that everyone should learn. As currently defined, with help from the National Science Foundation (NSF), these skills include problem formulation, logically organizing data, automating solutions through algorithmic thinking, and representing data through abstraction.…
Descriptors: Computer Science Education, Computation, Thinking Skills, Logical Thinking
Chen, Hong – ProQuest LLC, 2009
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Descriptors: Computer Security, Computer Science, Policy
Parakh, Abhishek – ProQuest LLC, 2011
Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…
Descriptors: Computers, Information Storage, Information Dissemination, Mathematics
Chinnappa Gounder Periaswamy, Senthilkumar – ProQuest LLC, 2010
Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent…
Descriptors: Identification, Probability, Computation, Engineering
Price, Kellie W. – ProQuest LLC, 2013
Decreasing enrollments, lower rates of student retention and changes in the learning styles of today's students are all issues that the Computer Science (CS) academic community is currently facing. As a result, CS educators are being challenged to find the right blend of technology and pedagogy for their curriculum in order to help students…
Descriptors: Computer Science Education, Introductory Courses, Programming, Majors (Students)
Chapman, Debra Laier – ProQuest LLC, 2013
Advances in technology and changes in educational strategies have resulted in the integration of technology into the classroom. Multimedia instructional tools (MMIT) have been identified as a way to provide student-centered active-learning instructional material to students. MMITs are common in introductory computer applications courses based on…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, Introductory Courses
Felts, Renee R. – ProQuest LLC, 2013
As increasing numbers of students enroll in introductory computer application courses, instructors have difficulty providing the needed assistance in the traditional laboratory setting. Simulators have been used to facilitate college instruction, but the effectiveness of using a simulator in an introductory computer application course had not yet…
Descriptors: Outcomes of Education, Community Colleges, Two Year College Students, Introductory Courses
LeShea, Andrea Valene – ProQuest LLC, 2013
The purpose of this quasi-experimental static-group comparison study was to test the theory of transactional distance that relates the inclusion of synchronous class sessions into an online introductory computer course to students' levels of satisfaction and academic achievement at a post-secondary technical college. This study specifically looked…
Descriptors: Synchronous Communication, Academic Achievement, Student Attitudes, Satisfaction
Bohman, Paul R. – ProQuest LLC, 2012
Digital technologies allow people with disabilities to participate independently in society in ways they never could before. The full realization of these new opportunities remains elusive, though, because working professionals in the information and communication technology (ICT) field rarely receive adequate training in how to make digital ICT…
Descriptors: Foreign Countries, Accessibility (for Disabled), Information Technology, Computer Science Education
Miller, Timothy A. – ProQuest LLC, 2010
This thesis describes a generative model for representing disfluent phenomena in human speech. This model makes use of observed syntactic structure present in disfluent speech, and uses a right-corner transform on syntax trees to model this structure in a very natural way. Specifically, the phenomenon of speech repair is modeled by explicitly…
Descriptors: Psycholinguistics, Maintenance, Syntax, Speech Communication
Pages: 1  |  ...  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  ...  |  30