Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Science Education | 4 |
| Computer System Design | 4 |
| Metadata | 4 |
| Programming | 3 |
| Access to Information | 2 |
| Classification | 2 |
| College Instruction | 2 |
| Computer Software | 2 |
| Computer Software Evaluation | 2 |
| Educational Resources | 2 |
| Information Retrieval | 2 |
| More ▼ | |
Author
| Abel, Marie-Helene | 1 |
| Amin, Rohan Mahesh | 1 |
| Barry, Catherine | 1 |
| Benayache, Ahcene | 1 |
| Botturi, Luca | 1 |
| Chaput, Brigitte | 1 |
| Derntl, Michael | 1 |
| Lenne, Dominique | 1 |
| Miller, L. D. | 1 |
| Moulin, Claude | 1 |
| Nugent, Gwen | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
Audience
Location
| France | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Derntl, Michael; Botturi, Luca – Computer Science Education, 2006
Coming from architecture, through computer science, pattern-based design spread into other disciplines and is nowadays recognized as a powerful way of capturing and reusing effective design practice. However, current pedagogical pattern approaches lack widespread adoption, both by users and authors, and are still limited to individual initiatives.…
Descriptors: Computer System Design, Computer Science Education, Design Requirements, Scientific Concepts
Abel, Marie-Helene; Benayache, Ahcene; Lenne, Dominique; Moulin, Claude; Barry, Catherine; Chaput, Brigitte – Educational Technology & Society, 2004
E-learning leads to evolutions in the way of designing a course. Diffused through the web, the course content cannot be the direct transcription of a face to face course content. A course can be seen as an organization in which different actors are involved. These actors produce documents, information and knowledge that they often share. We…
Descriptors: Course Content, Internet, College Instruction, Models

Peer reviewed
Direct link
