NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)0
Since 2017 (last 10 years)2
Since 2007 (last 20 years)11
Audience
Researchers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 23 results Save | Export
Ryan C. Bleile – ProQuest LLC, 2021
Since near the very beginning of electronic computing, Monte Carlo particle transport has been a fundamental approach for solving computational physics problems. Due to the high computational demands and inherently parallel nature of these applications, Monte Carlo transport applications are often performed in the supercomputing environment. That…
Descriptors: Monte Carlo Methods, Computers, Computer Oriented Programs, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Dillenbourg, Pierre – International Journal of Artificial Intelligence in Education, 2016
How does AI&EdAIED today compare to 25 years ago? This paper addresses this evolution by identifying six trends. The trends are ongoing and will influence learning technologies going forward. First, the physicality of interactions and the physical space of the learner became genuine components of digital education. The frontier between the…
Descriptors: Artificial Intelligence, Educational Trends, Trend Analysis, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Wan, Han; Liu, Kangxu; Yu, Qiaoye; Gao, Xiaopeng – IEEE Transactions on Learning Technologies, 2019
Most educational institutions adopted the hybrid teaching mode through learning management systems. The logging data/clickstream could describe learners' online behavior. Many researchers have used them to predict students' performance, which has led to a diverse set of findings, but how to use insights from captured data to enhance learning…
Descriptors: Educational Practices, Learner Engagement, Identification, Study Habits
Perez, Jerry F. – ProQuest LLC, 2013
The goal of the dissertation study was to evaluate the existing DG scheduling algorithm. The evaluation was developed through previously explored simulated analyses of DGs performed by researchers in the field of DG scheduling optimization and to improve the current RT framework of the DG at TTU. The author analyzed the RT of an actual DG, thereby…
Descriptors: Computer Science, Scheduling, Mathematics, Universities
Bandari, Roja – ProQuest LLC, 2013
Elementary actions online establish an individual's existence on the web and her/his orientation toward different issues. In this sense, actions truly define a user in spaces like online forums and communities and the aggregate of elementary actions shape the atmosphere of these online spaces. This observation, coupled with the unprecedented scale…
Descriptors: Internet, Behavior, Users (Information), Communication (Thought Transfer)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Umarji, Medha – ProQuest LLC, 2009
Software metrics are measures of software products and processes. Metrics are widely used by software organizations to help manage projects, improve product quality and increase efficiency of the software development process. However, metrics programs tend to have a high failure rate in organizations, and developer pushback is one of the sources…
Descriptors: Metric System, Motivation, Computer Software, Fear
Zhu, Guangyu – ProQuest LLC, 2009
The nature and scope of available documents are changing significantly in many areas of document analysis and retrieval as complex, heterogeneous collections become accessible to virtually everyone via the web. The increasing level of diversity presents a great challenge for document image content categorization, indexing, and retrieval.…
Descriptors: Printed Materials, Measures (Individuals), Electronic Equipment, Dictionaries
Friel, Charles M.; And Others – 1980
Designed to help the correctional administrator meet external demands for information, this detailed analysis of the demand information problem identifies the sources of requests for and the nature of the information required from correctional institutions and discusses the kinds of analytic capabilities required to satisfy most demand information…
Descriptors: Computer Programs, Computer Science, Computer Storage Devices, Computers
Peer reviewed Peer reviewed
Hartson, H. Rex – Journal of the American Society for Information Science, 1974
A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)
Descriptors: Automatic Indexing, Computer Science, Confidentiality, Data Processing
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Chachra, Vinod; Heterick, Robert C. – CAUSE/EFFECT, 1982
The decision support system (DSS) environment, the functional requirements of a DSS, and the architectural requirements of the computer systems and communications network necessary to support a DSS are discussed. Changes in the computing environment that are necessary to implement decision support systems are suggested. (Author/MLW)
Descriptors: Computer Science, Computers, Data Processing, Decision Making
Mills, Richard P. – 1978
The educational community is recognizing that it has had little direct control over or knowledge of educational data collection. The objective of this paper is to present a description of presently collected financial data collected by a state education department. An entity set model is used to create a relational view of the data to facilitate…
Descriptors: Accountability, Computer Science, Data Collection, Databases
Rice, Michael L. – CAUSE/EFFECT, 1979
Software design is still a craft; techniques are based on the way things have been done, not on basic theorems or design principles. Suggests that academic software design needs to be more like a science or technology and that a taxonomy of design solutions or classification method is required. Describes two case studies. (MLW)
Descriptors: Case Studies, Classification, Computer Science, Data Analysis
Aanstoos, Christopher M. – 1985
In this paper the theory that human thinking proceeds according to the computer model, or symbol manipulation, is reviewed and challenged. The research used as subjects five highly rated tournament chess players who "thought aloud" during a chess game to provide tape recorded protocols of decisions made while playing. These protocols…
Descriptors: Cognitive Processes, Cognitive Style, Computer Science, Computer Simulation
Previous Page | Next Page »
Pages: 1  |  2