NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 11,116 to 11,130 of 28,052 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Garrett, Nathan – Educational Technology & Society, 2011
This project attempts to improve electronic portfolio software through the creation of a design model using ownership, ease of use, and social learning variables to predict user adoption. The pilot software attempts to encourage student learning by enhancing peer interaction. The software was used by two groups of students. The first group used it…
Descriptors: Higher Education, Portfolio Assessment, Computer Software, Usability
Peer reviewed Peer reviewed
Direct linkDirect link
den Ouden, Hanny; van Wijk, Carel – Business Communication Quarterly, 2011
Students write papers in many of their courses to improve their writing skills and to foster an active attitude toward learning. Every year, they hand in hundreds of papers for teachers to assess. This stream may get polluted in two ways: by simple copying from Internet sources and by the exchange of text fragments between students. These…
Descriptors: Foreign Countries, College Students, Plagiarism, Cheating
Peer reviewed Peer reviewed
Direct linkDirect link
Bowers, Janet; Bezuk, Nadine; Aguilar, Karen – International Journal of Mathematical Education in Science and Technology, 2011
Designing didactic objects involves imagining how students can conceive of specific mathematical topics and then imagining what types of classroom discussions could support these mental constructions. This study investigated whether it was possible to design Java applets that might serve as didactic objects to support online learning where…
Descriptors: Electronic Learning, Online Courses, Mathematics, Models
Peer reviewed Peer reviewed
Direct linkDirect link
McLaren, Bruce M.; DeLeeuw, Krista E.; Mayer, Richard E. – Computers & Education, 2011
Should an intelligent software tutor be polite, in an effort to motivate and cajole students to learn, or should it use more direct language? If it should be polite, under what conditions? In a series of studies in different contexts (e.g., lab versus classroom) with a variety of students (e.g., low prior knowledge versus high prior knowledge),…
Descriptors: Feedback (Response), Test Items, Intervention, Intelligent Tutoring Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Gurmukh; Siddiqui, Khalid; Singh, Mankiran; Singh, Satpal – Journal of Educational Technology Systems, 2011
The current research article is based on a simple and practical way of employing the computational power of widely available, versatile software MS Excel 2007 to perform interactive computer simulations for undergraduate/graduate students in biology, biochemistry, biophysics, microbiology, medicine in college and university classroom setting. To…
Descriptors: Heredity, Genetics, Biological Sciences, Medical Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Werner, Laurie A.; Frank, Charles E. – Information Systems Education Journal, 2010
Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, we turned to the internet. This paper describes several resources for teaching computer…
Descriptors: Information Security, Information Science Education, Video Technology, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jin, Ng Yu – Advances in Language and Literary Studies, 2010
Students are believed to learn at optimum level with materials with a lot of white space since the existence of vast number of words and limited amount of white space, especially in textbooks may contribute to the increase in anxiety among learners (Tomlinson, 1998). This study evaluates the amount of white space in terms of pixels in the…
Descriptors: Textbooks, Textbook Evaluation, English (Second Language), Second Language Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Skupas, Bronius – Informatics in Education, 2010
Automatic program evaluation is a way to assess source program files. These techniques are used in learning management environments, programming exams and contest systems. However, use of automated program evaluation encounters problems: some evaluations are not clear for the students and the system messages do not show reasons for lost points.…
Descriptors: Foreign Countries, Feedback (Response), Automation, Computer Software
Vee, Annette – ProQuest LLC, 2010
This dissertation looks at computer programming through the lens of literacy studies, building from the concept of code as a written text with expressive and rhetorical power. I focus on the intersecting technological and social factors of computer code writing as a literacy--a practice I call "proceduracy". Like literacy, proceduracy is a human…
Descriptors: Computer Software, Computers, Programming, Foreign Countries
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Fan, Quyin – ProQuest LLC, 2010
Program comprehension is the most important and frequent process in software maintenance. Extensive research has found that individual characteristics of programmers, differences of computer programs, and differences of task-driven motivations are the major factors that affect the program comprehension results. There is no study specifically…
Descriptors: Computer Software, Maintenance, Programming, Employees
Neal, Maxwell Lewis – ProQuest LLC, 2010
Biosimulation models are valuable, versatile tools used for hypothesis generation and testing, codification of biological theory, education, and patient-specific modeling. Driven by recent advances in computational power and the accumulation of systems-level experimental data, modelers today are creating models with an unprecedented level of…
Descriptors: Semantics, Measures (Individuals), Semiotics, Computer Software
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Hills, Christina, Ed. – APPA: Association of Higher Education Facilities Officers (NJ1), 2010
This paper features another expanded Web-based Facilities Performance Indicators Report (FPI). The purpose of APPA's Facilities Performance Indicators is to provide a representative set of statistics about facilities in educational institutions. The 2008-09 iteration of the Web-based Facilities Performance Indicators Survey was posted and…
Descriptors: Colleges, School Maintenance, Facility Guidelines, Educational Facilities
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Pages: 1  |  ...  |  738  |  739  |  740  |  741  |  742  |  743  |  744  |  745  |  746  |  ...  |  1871