Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 11 |
Descriptor
| Computer Science | 20 |
| Data | 20 |
| Computers | 7 |
| Data Processing | 6 |
| Higher Education | 6 |
| Information Storage | 6 |
| Computer Software | 5 |
| Information Technology | 5 |
| Case Studies | 4 |
| Computer Security | 4 |
| Data Analysis | 4 |
| More ▼ | |
Source
Author
Publication Type
| Journal Articles | 9 |
| Dissertations/Theses -… | 4 |
| Reports - Descriptive | 4 |
| Reports - Research | 3 |
| Collected Works - Proceedings | 2 |
| Reports - General | 2 |
| Collected Works - General | 1 |
| Reference Materials -… | 1 |
Education Level
| Higher Education | 7 |
| Postsecondary Education | 5 |
| Elementary Secondary Education | 3 |
| Secondary Education | 2 |
| Elementary Education | 1 |
Location
| Ohio | 2 |
| United States | 2 |
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Czech Republic | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Family Educational Rights and… | 1 |
| Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Grant, Robert – Statistics Education Research Journal, 2017
Statistical literacy, the ability to understand and make use of statistical information including methods, has particular relevance in the age of data science, when complex analyses are undertaken by teams from diverse backgrounds. Not only is it essential to communicate to the consumers of information but also within the team. Writing from the…
Descriptors: Data, Statistics, Numeracy, Artificial Intelligence
Fitzgerald, Brian K.; Barkanic, Steve; Cárdenas-Navia, Isabel; Chen, Janet; Elzey, Karen; Hughes, Debbie; Troyan, Danielle – Industry and Higher Education, 2016
BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) through regional initiatives in data science and analytics (DSA). Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF seeded new undergraduate pathways in DSA at Case Western…
Descriptors: Higher Education, Case Studies, Labor Force, Program Implementation
Loh, Matthew – ProQuest LLC, 2013
The scalability of CMOS technology has driven computation into a diverse range of applications across the power consumption, performance and size spectra. Communication is a necessary adjunct to computation, and whether this is to push data from node-to-node in a high-performance computing cluster or from the receiver of wireless link to a neural…
Descriptors: Power Technology, Scaling, Computer Science, Computation
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Kashiri, Erica; Troyan, Danielle – Industry and Higher Education, 2014
Partnerships between higher education and business have long been an important part of the academic landscape, but often they are based on shorter-term transactional objectives rather than on longer-term strategic goals. BHEF's National Higher Education and Workforce Initiative brings together business and academia at the institutional,…
Descriptors: School Business Relationship, Partnerships in Education, Computer Security, STEM Education
Mowafi, Yaser Abdallah – ProQuest LLC, 2009
Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…
Descriptors: Decision Support Systems, Computer System Design, Computer Mediated Communication, Data
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Carpenter, Donald A. – Journal of Information Systems Education, 2008
Confusion exists among database textbooks as to the goal of normalization as well as to which normal form a designer should aspire. This article discusses such discrepancies with the intention of simplifying normalization for both teacher and student. This author's industry and classroom experiences indicate such simplification yields quicker…
Descriptors: Database Design, Database Management Systems, Data, Reliability
Seipp, David J. – 1975
Concern is growing over the problems of freedom of information, individual right to privacy, and automated recordkeeping systems. As a guide to policy considerations for overview and for detail, this extensive structured bibliography of privacy and disclosure literature adopts a topical scheme, dividing the subject first into governmental and…
Descriptors: Bibliographies, Civil Rights, Computer Science, Confidential Records
Wefer, Stephen H.; Anderson, O. Roger – Journal of Science Teacher Education, 2008
Bioinformatics, merging biological data with computer science, is increasingly incorporated into school curricula at all levels. This case study of 10 secondary school students highlights student individual differences (especially the way they processed information and integrated procedural and analytical thought) and summarizes a variety of…
Descriptors: Curriculum Design, Student Attitudes, Units of Study, Computer Science
Dostert, Bozena Henisz – 1971
Three outstanding features of the Rapidly Extensible Language (REL) System are discussed. REL itself is an integrated software system designed to facilitate conversational interaction with the computer, especially by those working with dynamic, highly interrelated data. The system's main parts are: 1) the operating system, which manages the…
Descriptors: Computer Programs, Computer Science, Computers, Data
Bigelow, Richard Henry – 1973
A bulk data input processor which is available for the Rapidly Extensible Language (REL) English versions is described. In REL English versions, statements that declare names of data items and their interrelationships normally are lines from a terminal or cards in a batch input stream. These statements provide a convenient means of declaring some…
Descriptors: Computer Science, Computer Storage Devices, Computers, Data
Association for Computing Machinery, New York, NY. – 1975
The papers and discussions of the 1975 Pacific Region meeting of the Association for Computing Machinery are presented. Topics included (1) the current and emerging state of the art in data management software and hardware, (2) relational systems with particular attention to new developments in systems for relational data bases, (3) advances in…
Descriptors: Computer Programs, Computer Science, Computer Storage Devices, Computers
Wirth, Niklaus – Scientific American, 1984
Built-in data structures are the registers and memory words where binary values are stored; hard-wired algorithms are the fixed rules, embodied in electronic logic circuits, by which stored data are interpreted as instructions to be executed. Various topics related to these two basic elements of every computer program are discussed. (JN)
Descriptors: Algorithms, Computer Science, Computer Software, Data
Levine, Paula Naomi – 1969
This thesis describes the requirements for a buffer storage device, with respect to other system components and its own limitations, which is designed to aid in the economic transmission of processed data from a central computer to distant terminals. Proceeding from the fact that tariff rates on wide band educational television channels are…
Descriptors: Communications, Computer Assisted Instruction, Computer Science, Computer Storage Devices
Previous Page | Next Page »
Pages: 1 | 2
Peer reviewed
Direct link
