Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Algorithms | 3 |
| Computer Networks | 3 |
| Computer Software | 3 |
| Civil Liberties | 1 |
| Client Server Architecture | 1 |
| Coding | 1 |
| Computer Science Education | 1 |
| Computer Security | 1 |
| Crime | 1 |
| Critical Thinking | 1 |
| Engineering | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Dissertations/Theses -… | 1 |
| Opinion Papers | 1 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ronny Pacheco – ProQuest LLC, 2020
Motivated by applications in health care systems, this study focused on queueing network models with instances of simultaneous resource possession under capacity restrictions in different stages. Customers during service at certain nodes in the first-level or primary system may simultaneously need service from a second-level server. In this…
Descriptors: Engineering, Engineering Technology, Computer Networks, Resource Allocation
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Peer reviewedDiamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks

Direct link
