NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 5,026 to 5,040 of 10,848 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Battig, Michael E. – Information Systems Education Journal, 2010
Survey results from a two year project are presented. The survey instruments were developed through review of the literature involving similar studies of student perceptions and with the assistance of social scientists. The study includes both high school and college student perceptions of computing. The survey also contrasts student perceptions…
Descriptors: High School Students, Computer Attitudes, Computer Science, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mannila, Linda – Informatics in Education, 2010
In this paper, we analyze the errors novice students make when developing invariant based programs. In addition to presenting the general error types, we also look at what students have difficulty with when it comes to expressing invariants. The results indicate that an introductory course utilizing the invariant based approach is suitable from…
Descriptors: Novices, Error Patterns, Difficulty Level, Introductory Courses
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Bajracharya, Sushil Krishna – ProQuest LLC, 2010
Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…
Descriptors: Semantics, Search Engines, Engines, Measures (Individuals)
Peng, Yefei – ProQuest LLC, 2010
An ontology mapping neural network (OMNN) is proposed in order to learn and infer correspondences among ontologies. It extends the Identical Elements Neural Network (IENN)'s ability to represent and map complex relationships. The learning dynamics of simultaneous (interlaced) training of similar tasks interact at the shared connections of the…
Descriptors: Training Methods, Genealogy, Logical Thinking, Cognitive Processes
Peer reviewed Peer reviewed
Direct linkDirect link
Cheng, Y.-P.; Lin, J. M.-C. – IEEE Transactions on Education, 2010
This paper documents several years of experimentation with a new approach to organizing and managing projects in a software engineering course. The initial failure and subsequent refinements that the new approach has been through since 2004 are described herein. The "constrained and guided" approach, as it is called, has helped to reduce…
Descriptors: Foreign Countries, Student Projects, Computer Software, Engineering
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kline, Douglas M.; Vetter, Ron; Barnhill, Karen – Information Systems Education Journal, 2013
This article describes the creation of the Master of Science of Computer Science and Information Systems at University of North Carolina Wilmington. The creation of this graduate degree was funded by the Sloan Foundation as a new type of program, the Professional Master's. The program was designed with significant industry input, and is truly…
Descriptors: Masters Programs, Program Development, Interdisciplinary Approach, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Al-Khasawneh, Ahmad; Hammad, Bashar K. – Education for Information, 2013
Service learning methodologies provide information systems students with the opportunity to create and implement systems in real-world, public service-oriented social contexts. This paper presents a case study of integrating a service learning project into an undergraduate Computer Information Systems course titled "Information Systems"…
Descriptors: Foreign Countries, Service Learning, Civics, Citizen Participation
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Byeongsu; Kim, Taehun; Kim, Jonghoon – Journal of Educational Computing Research, 2013
The paper-and-pencil programming strategy (PPS) is a way of representing an idea logically by any representation that can be created using paper and pencil. It was developed for non-computer majors to improve their understanding and use of computational thinking and increase interest in learning computer science. A total of 110 non-majors in their…
Descriptors: Teaching Methods, Nonmajors, Computer Science, Thinking Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Meerbaum-Salant, Orni; Armoni, Michal; Ben-Ari, Mordechai – Computer Science Education, 2013
Scratch is a visual programming environment that is widely used by young people. We investigated if Scratch can be used to teach concepts of computer science (CS). We developed learning materials for middle-school students that were designed according to the constructionist philosophy of Scratch and evaluated them in a few schools during two…
Descriptors: Computer Science Education, Middle School Students, Programming Languages, Taxonomy
Peer reviewed Peer reviewed
Direct linkDirect link
Magana, Alejandra J.; Falk, Michael L.; Reese, Michael J., Jr. – ACM Transactions on Computing Education, 2013
This article investigates the effectiveness of a course employing a discipline-based computing approach. The research questions driving this study were: (1) Can experiences with discipline-based computing promote students' acquisition and application of foundational computing concepts and procedures? (2) How do students perceive and experience the…
Descriptors: Engineering Education, Computer Science Education, Undergraduate Students, Instructional Effectiveness
Mingo, Wendye Dianne – ProQuest LLC, 2013
This study attempts to determine if authentic learning strategies can be used to acquire knowledge of and increase motivation for computational thinking. Over 600 students enrolled in a computer literacy course participated in this study which involved completing a pretest, posttest and motivation survey. The students were divided into an…
Descriptors: Learning Strategies, Computation, Thinking Skills, Computer Literacy
Koppelman, Herman – International Association for Development of the Information Society, 2013
This paper discusses three possible ways of applying podcasts in distance education: podcasts of recordings of virtual classes, podcasts produced for specific pedagogical aims, and podcasts produced by external organizations. Through a survey we gained insight in the (until now limited) experiences of our distant students with podcasts, and also…
Descriptors: Electronic Learning, Educational Technology, Technology Uses in Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Dishaw, Mark T.; Eierman, Michael A.; Iversen, Jacob H.; Philip, George – Journal of Information Technology Education: Research, 2013
As collaboration among teams that are distributed in time and space is becoming increasingly important, there is a need to understand the efficacy of tools available to support that collaboration. This study employs a combination of the Technology Acceptance Model (TAM) and the Task-Technology Fit (TTF) model to compare four different technologies…
Descriptors: Cooperation, Collaborative Writing, Electronic Publishing, Word Processing
Pages: 1  |  ...  |  332  |  333  |  334  |  335  |  336  |  337  |  338  |  339  |  340  |  ...  |  724