Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 5 |
| Since 2017 (last 10 years) | 6 |
| Since 2007 (last 20 years) | 6 |
Descriptor
Source
Author
| Rasmussen, Edie M. | 2 |
| Abhishek Vaish | 1 |
| Amitabh Verma | 1 |
| Benjamin L. Edelman | 1 |
| Dan Li | 1 |
| Diamond, Ted | 1 |
| Finn, Gregory G. | 1 |
| Gordonov, Anatoliy | 1 |
| Huichao Li | 1 |
| Kieras, David E. | 1 |
| Klibaner, Roberta | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 9 |
| Reports - Research | 6 |
| Information Analyses | 4 |
| Reports - Descriptive | 4 |
| Opinion Papers | 3 |
| Dissertations/Theses -… | 2 |
| Speeches/Meeting Papers | 2 |
| Collected Works - General | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
| Researchers | 2 |
| Practitioners | 1 |
Location
| China | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Benjamin L. Edelman – ProQuest LLC, 2024
This dissertation is about a particular style of research. The philosophy of this style is that in order to scientifically understand deep learning, it is fruitful to investigate what happens when neural networks are trained on simple, mathematically well-defined tasks. Even though the training data is simple, the training algorithm can end up…
Descriptors: Learning Processes, Research Methodology, Algorithms, Models
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Nan Wu – International Journal of Web-Based Learning and Teaching Technologies, 2024
Higher education is becoming increasingly competitive and all educational institutions are concentrating on improving quality and changing traditional higher education teaching methods. New-type classroom instruction has embraced a unique advancement opportunity with the arrival of the fifth generation (5G) era. It is critical to develop a…
Descriptors: Instructional Effectiveness, Internet, Computer Literacy, Artificial Intelligence
Amitabh Verma – Journal of Educators Online, 2025
This study provides a thorough bibliometric analysis of the research landscape concerning the application of soft computing in higher education. This study collects 5,140 pieces including books, book chapters, journal articles published in respected journals, and conference papers presented at notable international conferences that were published…
Descriptors: Bibliometrics, Computer Uses in Education, Computer Science, Higher Education
Ronny Pacheco – ProQuest LLC, 2020
Motivated by applications in health care systems, this study focused on queueing network models with instances of simultaneous resource possession under capacity restrictions in different stages. Customers during service at certain nodes in the first-level or primary system may simultaneously need service from a second-level server. In this…
Descriptors: Engineering, Engineering Technology, Computer Networks, Resource Allocation
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Finn, Gregory G. – 1987
This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…
Descriptors: Algorithms, Computer Networks, Computer System Design, Models
Peer reviewedRasmussen, Edie M. – Annual Review of Information Science and Technology (ARIST), 1992
Examines parallel computer architecture and the use of parallel processors for text. Topics discussed include parallel algorithms; performance evaluation; parallel information processing; parallel access methods for text; parallel and distributed information retrieval systems; parallel hardware for text; and network models for information…
Descriptors: Algorithms, Computer Networks, Evaluation Methods, Information Processing
Peer reviewedRasmussen, Edie M.; And Others – Information Processing and Management, 1991
This issue contains nine articles that provide an overview of trends and research in parallel information retrieval. Topics discussed include network design for text searching; the Connection Machine System; PThomas, an adaptive information retrieval system on the Connection Machine; algorithms for document clustering; and system architecture for…
Descriptors: Algorithms, Cluster Grouping, Computer Networks, Computer System Design
Snyder, Herbert; Kurtze, Douglas – Proceedings of the ASIS Annual Meeting, 1992
Discusses the use of chaos, or nonlinear dynamics, for investigating computer-mediated communication. A comparison between real, human-generated data from a computer network and similarly constructed random-generated data is made, and mathematical procedures for determining chaos are described. (seven references) (LRW)
Descriptors: Algorithms, Chaos Theory, Comparative Analysis, Computer Networks
Peer reviewedMareschal, Denis; Shultz, Thomas R. – Cognitive Development, 1996
Presents a computational framework for modeling cognitive development that provides a language paradigm with which to compare and contrast different facets of children's knowledge. Describes the generative connectionist algorithm "cascade-correlation," the successful use of the algorithm to model cognitive development in various…
Descriptors: Algorithms, Children, Cognitive Development, Cognitive Measurement
Peer reviewedDiamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks
Mayer, John; Kieras, David E. – 1987
Using a system based on standard augmented transition network (ATN) parsing approach, this report describes a technique for the rapid development of natural language parsing, called High-Level Grammar Specification Language (HGSL). The first part of the report describes the syntax and semantics of HGSL and the network implementation of each of its…
Descriptors: Algorithms, Authoring Aids (Programing), Computer Networks, Computer Oriented Programs
Gordonov, Anatoliy; Kress, Michael; Klibaner, Roberta – 1998
This paper presents a model of an intelligent computer network that provides real-time evaluation of students' performance by incorporating intelligence into the application layer protocol. Specially designed drills allow students to independently solve a number of problems based on current lecture material; students are switched to the most…
Descriptors: Academic Achievement, Algorithms, Computer Assisted Instruction, Computer Managed Instruction

Direct link
