Publication Date
| In 2026 | 0 |
| Since 2025 | 38 |
| Since 2022 (last 5 years) | 208 |
| Since 2017 (last 10 years) | 382 |
| Since 2007 (last 20 years) | 941 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 279 |
| Teachers | 123 |
| Researchers | 60 |
| Administrators | 35 |
| Policymakers | 33 |
| Students | 25 |
| Media Staff | 6 |
| Parents | 4 |
| Community | 2 |
| Counselors | 1 |
Location
| United States | 40 |
| Canada | 39 |
| United Kingdom | 37 |
| Australia | 34 |
| California | 25 |
| United Kingdom (Great Britain) | 25 |
| Turkey | 21 |
| Texas | 20 |
| China | 18 |
| Germany | 18 |
| Israel | 17 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Koch, Melissa; Gorges, Torie; Penuel, William R. – Afterschool Matters, 2012
"Co-design"--including youth development staff along with curriculum designers--is the key to developing an effective program that is both scalable and sustainable. This article describes Build IT, a two-year afterschool and summer curriculum designed to help middle school girls develop fluency in information technology (IT), interest in…
Descriptors: Females, Computers, Information Technology, Computer Science
Gentile, Lisa; Caudill, Lester; Fetea, Mirela; Hill, April; Hoke, Kathy; Lawson, Barry; Lipan, Ovidiu; Kerckhove, Michael; Parish, Carol; Stenger, Krista; Szajda, Doug – Journal of College Science Teaching, 2012
To help undergraduates make connections among disciplines so they are able to approach, evaluate, and contribute to the solutions of important global problems, our campus has been focused on interdisciplinary research and education opportunities across the science, technology, engineering, and mathematics (STEM) disciplines. This paper describes…
Descriptors: Physics, Majors (Students), Interdisciplinary Approach, Computer Science
Hart, Beth; Carman, Elaine; Luisier, Danielle; Vasavada, Natasha – College Board, 2011
The College Board has been a strong advocate for and played an active role in the development of the Common Core State Standards. As part of this collaboration, the College Board helped draft the standards and helped shape the initiative by providing executive guidance on the Common Core Advisory Committee. The goal of the Common Core State…
Descriptors: Advisory Committees, State Standards, Advanced Placement, English Literature
Jara, Carlos A.; Candelas, Francisco A.; Puente, Santiago T.; Torres, Fernando – Computers & Education, 2011
Automatics and Robotics subjects are always greatly improved when classroom teaching is supported by adequate laboratory courses and experiments following the "learning by doing" paradigm, which provides students a deep understanding of theoretical lessons. However, expensive equipment and limited time prevent teachers having sufficient…
Descriptors: Undergraduate Students, Teacher Effectiveness, Experiential Learning, Laboratories
Abbiss, Jane – Gender and Education, 2011
Students negotiate their masculine and feminine identities as students of information and communication technology (ICT) and computer users as they participate in specialist ICT courses and in other areas of their lives. As they negotiate these roles, they are established in relations of power and authority with the technology and with each other.…
Descriptors: Computers, Foreign Countries, Specialists, Gender Issues
Devedzic, V.; Milenkovic, S. R. – IEEE Transactions on Education, 2011
This paper describes the authors' experience of teaching agile software development to students of computer science, software engineering, and other related disciplines, and comments on the implications of this and the lessons learned. It is based on the authors' eight years of experience in teaching agile software methodologies to various groups…
Descriptors: Computer Software, Computer Science, Engineering, College Faculty
Zendler, Andreas; Spannagel, Christian – Journal on Educational Resources in Computing, 2008
The design of computer science curricula should rely on central concepts of the discipline rather than on technical short-term developments. Several authors have proposed lists of basic concepts or fundamental ideas in the past. However, these catalogs were based on subjective decisions without any empirical support. This article describes the…
Descriptors: Computer Science Education, Computers, Multivariate Analysis, Computer Science
Chiu, Chiung-Fang; Lee, Greg C. – Computers & Education, 2009
The current practice of traditional in-class lecture for learning computer science (CS) in the high schools of Taiwan is in need of revamping. Teachers instruct on the use of commercial software instead of teaching CS concepts to students. The lack of more suitable teaching materials and limited classroom time are the main reasons for the…
Descriptors: High Schools, Computer Science, Foreign Countries, Lecture Method
Battig, Michael E. – Information Systems Education Journal, 2010
Survey results from a two year project are presented. The survey instruments were developed through review of the literature involving similar studies of student perceptions and with the assistance of social scientists. The study includes both high school and college student perceptions of computing. The survey also contrasts student perceptions…
Descriptors: High School Students, Computer Attitudes, Computer Science, Information Technology
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Bajracharya, Sushil Krishna – ProQuest LLC, 2010
Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…
Descriptors: Semantics, Search Engines, Engines, Measures (Individuals)
Peng, Yefei – ProQuest LLC, 2010
An ontology mapping neural network (OMNN) is proposed in order to learn and infer correspondences among ontologies. It extends the Identical Elements Neural Network (IENN)'s ability to represent and map complex relationships. The learning dynamics of simultaneous (interlaced) training of similar tasks interact at the shared connections of the…
Descriptors: Training Methods, Genealogy, Logical Thinking, Cognitive Processes
Ballera, Melvin; Elssaedi, Mosbah Mohamed – Association for the Advancement of Computing in Education, 2012
There is an unrealized potential in the use of socially-oriented pedagogical agent and interactive simulation in e-learning system. In this paper, we investigate the impact of having a socially oriented tutor agent and the incorporation of interactive simulation in e-learning into student performances, perceptions and experiences for non-native…
Descriptors: Simulation, Foreign Countries, Computer Science, Electronic Learning
Denner, Jill; Werner, Linda; Ortiz, Eloy – Computers & Education, 2012
Computer game programming has been touted as a promising strategy for engaging children in the kinds of thinking that will prepare them to be producers, not just users of technology. But little is known about what they learn when programming a game. In this article, we present a strategy for coding student games, and summarize the results of an…
Descriptors: Females, Computer Uses in Education, Computers, Programming

Peer reviewed
Direct link
