NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 751 to 765 of 3,392 results Save | Export
Krishnamurthy, Janaki – ProQuest LLC, 2010
Given the increasing competition in the software industry and the critical consequences of software errors, it has become important for companies to achieve high levels of software quality. While cost reduction and timeliness of projects continue to be important measures, software companies are placing increasing attention on identifying the user…
Descriptors: Program Evaluation, Opinions, Privacy, Prediction
Peer reviewed Peer reviewed
Direct linkDirect link
Saban, Aslihan – Education, 2010
The purpose of this study was to examine the metaphors of exit-level Turkish computer teacher candidates about the concept of "internet". Participants included 45 seniors (23 boys and 22 girls) majoring in the Department of Computer and Instructional Technologies at Selcuk University, Ahmet Kelesoglu Faculty of Education. They were asked…
Descriptors: Educational Technology, Content Analysis, Internet, Figurative Language
Peer reviewed Peer reviewed
Direct linkDirect link
Lu, Eric Jui-Lin; Horng, Gwoboa; Yu, Chia-Ssu; Chou, Ling-Ying – Educational Technology & Society, 2010
To increase the interoperability and reusability of learning objects, Advanced Distributed Learning Initiative developed a model called Content Aggregation Model (CAM) to describe learning objects and express relationships between learning objects. However, the suggested relations defined in the CAM can only describe structure-oriented…
Descriptors: Management Systems, Semantics, Metadata, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Titterton, Nathaniel; Lewis, Colleen M.; Clancy, Michael J. – Computer Science Education, 2010
Lab-centric instruction emphasizes supervised, hands-on activities by substituting lab for lecture time. It combines a multitude of pedagogical techniques into the format of an extended, structured closed lab. We discuss the range of benefits for students, including increased staff interaction, frequent and varied self-assessments, integrated…
Descriptors: Learning Activities, Computer Assisted Instruction, Mathematics Instruction, Lecture Method
Peer reviewed Peer reviewed
Direct linkDirect link
Scime, A. – Computer Science Education, 2008
As computing makes the world a smaller place there will be an increase in the mobility of information technology workers and companies. The European Union has recognized the need for mobility and is instituting educational reforms to provide recognition of worker qualifications. Within computing there have been a number of model curricula proposed…
Descriptors: Information Technology, Foreign Countries, Computer Science Education, Global Approach
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Hasan, Ragib – ProQuest LLC, 2009
In today's world, information is increasingly created, processed, transmitted, and stored digitally. While the digital nature of information has brought enormous benefits, it has also created new vulnerabilities and attacks against data. Unlike physical documents, digitally stored information can be rapidly copied, erased, or modified. The…
Descriptors: Archives, Court Litigation, Information Management, Information Storage
Olson, Lars E. – ProQuest LLC, 2009
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
Descriptors: Databases, Access to Information, Computer Software, Computer Science
Howison, James – ProQuest LLC, 2009
This dissertation presents evidence that the production of Free and Open Source Software (FLOSS) is far more alone than together; it is far more often individual work done "in company" than it is teamwork. When tasks appear too large for an individual they are more likely to be deferred until they are easier rather than be undertaken through…
Descriptors: Evidence, Participant Observation, Cooperation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Carpenter, Donald A. – Journal of Information Systems Education, 2008
Confusion exists among database textbooks as to the goal of normalization as well as to which normal form a designer should aspire. This article discusses such discrepancies with the intention of simplifying normalization for both teacher and student. This author's industry and classroom experiences indicate such simplification yields quicker…
Descriptors: Database Design, Database Management Systems, Data, Reliability
Peer reviewed Peer reviewed
Direct linkDirect link
van Rooij, Iris – Cognitive Science, 2008
The recognition that human minds/brains are finite systems with limited resources for computation has led some researchers to advance the "Tractable Cognition thesis": Human cognitive capacities are constrained by computational tractability. This thesis, if true, serves cognitive psychology by constraining the space of computational-level theories…
Descriptors: Psychologists, Misconceptions, Cognitive Mapping, Theses
Sikora, Joanna; Pokropek, Artur – OECD Publishing (NJ1), 2011
This paper provides a comprehensive overview of adolescent career plans reported in PISA 2006. Its main focus is on the differences in the status and area of employment expected by girls and boys in high school. In almost all countries, girls lead boys in their interest in non-manual, high status professional occupations. This can be seen as a…
Descriptors: High School Students, Student Attitudes, Females, Foreign Countries
Murakami, Christine – Learning & Leading with Technology, 2011
It's no secret that fewer and fewer women are entering computer science fields. Attracting high school girls to computer science is only part of the solution. Retaining them while they are in higher education or the workforce is also a challenge. To solve this, there is a need to show girls that computer science is a wide-open field that offers…
Descriptors: Females, Computer Science, Grade 5, High Schools
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Walters, William H. – portal: Libraries and the Academy, 2011
This study evaluates the effectiveness of simple and expert searches in Google Scholar (GS), EconLit, GEOBASE, PAIS, POPLINE, PubMed, Social Sciences Citation Index, Social Sciences Full Text, and Sociological Abstracts. It assesses the recall and precision of 32 searches in the field of later-life migration: nine simple keyword searches and 23…
Descriptors: Online Searching, Web Sites, Navigation (Information Systems), Novices
Pages: 1  |  ...  |  47  |  48  |  49  |  50  |  51  |  52  |  53  |  54  |  55  |  ...  |  227