NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,096 to 1,110 of 3,392 results Save | Export
Peer reviewed Peer reviewed
Dessy, Raymond E., Ed. – Analytical Chemistry, 1982
Discusses five approaches used by industry/colleges to provide local area network (LAN) capabilities in the analytical laboratory: (1) mixed baseband bus network coupled to a star net; (2) broadband bus network; (3) ring network; (4) star network coupled to broadband net; and (5) simple multiprocessor center. Part I (September issue) focused on…
Descriptors: Chemistry, College Science, Communications, Computer Programs
Ricks, John – Technological Horizons in Education, 1988
Points out that mainframe computer users today can make their requirements known to the computer in simple English. Provides a listing of fourth generation computer language advantages over third generation languages. Summarizes a program to streamline faculty records on a mainframe computer. (MVL)
Descriptors: Artificial Languages, College Science, Computer Science, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Garvin-Doxas, Kathy; Barker, Lecia J. – Journal on Educational Resources in Computing, 2004
All learning environments are characterized by numerous communication and interaction practices, which lend themselves to an overall characterization of the climate as defensive or supportive. A case study of public communication and interaction in a large, research-intensive university's first year computer science courses illustrates a learning…
Descriptors: Communication (Thought Transfer), Females, Interaction, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Prichard, Janet J.; MacDonald, Laurie E. – Journal of Information Technology Education, 2004
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Descriptors: Terrorism, Textbooks, Computer Security, Public Agencies
Peer reviewed Peer reviewed
Direct linkDirect link
Tenenberg, Josh; Murphy, Laurie – Computer Science Education, 2005
This paper describes an empirical study that investigated the knowledge that Computer Science students have about the extent of their own previous learning. The study compared self-generated estimates of performance with actual performance on a data structures quiz taken by undergraduate students in courses requiring data structures as a…
Descriptors: Feedback (Response), Undergraduate Students, Student Attitudes, Prior Learning
Peer reviewed Peer reviewed
Evans, W. Keith – Planning for Higher Education, 1975
Describes an enrollment projection approach that can easily show the complete dynamics of institutional enrollment change and can involve upper management in the development and understanding of important assumptions underlying the projection activity. (Author/MLF)
Descriptors: Administrators, College Planning, Computer Science, Enrollment Projections
Lilly, Edward R. – 1985
Designed to assist teachers and administrators approaching the subject of computers for the first time to acquire a feel for computer terminology, this document presents a computer term glossary on three levels. (1) The terms most frequently used, called a "basic vocabulary," are presented first in three paragraphs which explain their meanings:…
Descriptors: Computer Literacy, Computer Science, Computers, Definitions
Weatherup, Jim, Comp. – 1985
This glossary contains brief definitions of more than 550 special or technical terms used in scientific, technical, and social science research. Entries include various kinds of statistical measures, research variables, types of research tests, and research methodologies. Some computer terminology is also included. The glossary includes both…
Descriptors: Computer Science, Glossaries, Research, Research Methodology
Sharman, Heather; Dorward, George – AEDS Monitor, 1975
Article describes the results of the evaluation of the Manitoba Schools Computer Network. (HB)
Descriptors: Computer Assisted Instruction, Computer Science, Evaluation, Program Evaluation
Peer reviewed Peer reviewed
Burt, P. J. – International Journal of Man-Machine Studies, 1975
A model is described to suggest how the visual system may keep track of perceived objects as their images move on the retina. (Author)
Descriptors: Computer Science, Models, Simulation, Visual Learning
Kern, Jerry – Coll Univ Bus, 1969
Descriptors: Computer Science, Information Dissemination, Information Retrieval, Information Systems
Wesselkamper, Thomas C. – 1974
After consideration of two recent examples of instruction sets for microprogramable computers, the article sketches known and new results about complete sets of functions which appear to be applicable to microlanguage development. Some needed areas of research are pointed out. Functional completeness is linked to research in control primitives for…
Descriptors: Computer Programs, Computer Science, Computers, Programing
Williams, J. H., Jr. – 1969
The development and testing of the Browsing On-line With Selective Retrieval (BROWSER) text retrieval system allowing a natural language query statement and providing on-line browsing capabilities through an IBM 2260 display terminal is described. The prototype system contains data bases of 25,000 German language patent abstracts, 9,000 English…
Descriptors: Automation, Computer Science, Indexing, Information Retrieval
Salton, Gerard – 1969
Several algorithms were investigated which would allow a user to interact with an automatic document retrieval system by requesting relevance judgments on selected sets of documents. Two viewpoints were taken in evaluation. One measured the movement of queries toward the optimum query as defined by Rocchio; the other measured the retrieval…
Descriptors: Computer Science, Information Retrieval, Information Science, Information Storage
Weiman, Carl F. R.; Rothstein, Jerome – 1972
This study has investigated some pattern recognition capabilities of devices consisting of arrays of cooperating elements acting in parallel. The problem of recognizing straight lines in general position on the quadratic lattice has been completely solved by applying parallel acting algorithms to a special code for lines on the lattice. The…
Descriptors: Algorithms, Computer Science, Computers, Doctoral Dissertations
Pages: 1  |  ...  |  70  |  71  |  72  |  73  |  74  |  75  |  76  |  77  |  78  |  ...  |  227