Publication Date
| In 2026 | 11 |
| Since 2025 | 887 |
| Since 2022 (last 5 years) | 4096 |
| Since 2017 (last 10 years) | 8012 |
| Since 2007 (last 20 years) | 13889 |
Descriptor
Source
Author
| Wang, Wen-Chung | 29 |
| de Jong, Ton | 28 |
| Chang, Hua-Hua | 24 |
| Meijer, Rob R. | 24 |
| Cohen, Allan S. | 23 |
| Nandakumar, Ratna | 23 |
| Mislevy, Robert J. | 22 |
| Sinharay, Sandip | 21 |
| Gwo-Jen Hwang | 20 |
| Reckase, Mark D. | 20 |
| Cai, Li | 18 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 1775 |
| Teachers | 1340 |
| Researchers | 451 |
| Students | 203 |
| Administrators | 123 |
| Policymakers | 73 |
| Community | 15 |
| Counselors | 14 |
| Media Staff | 14 |
| Parents | 10 |
| Support Staff | 6 |
| More ▼ | |
Location
| Australia | 377 |
| Turkey | 315 |
| United Kingdom | 271 |
| China | 270 |
| Canada | 256 |
| Taiwan | 233 |
| United States | 204 |
| Germany | 191 |
| Spain | 186 |
| California | 157 |
| Indonesia | 149 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 4 |
| Meets WWC Standards with or without Reservations | 5 |
| Does not meet standards | 3 |
Woollams, Anna M.; Joanisse, Marc; Patterson, Karalyn – Journal of Memory and Language, 2009
The standard task used to study inflectional processing of verbs involves presentation of the stem form from which the participant is asked to generate the past tense. This task reveals a processing disadvantage for irregular relative to regular English verbs, more pronounced for lower-frequency items. Dual- and single-mechanism theories of…
Descriptors: Semantics, Verbs, Morphology (Languages), Morphemes
Johnson, Taylor E.; Dixon, Mark R. – Journal of Applied Behavior Analysis, 2009
Past research has demonstrated a transformation of stimulus functions under similar conditions using gambling tasks and adults (e.g., Zlomke & Dixon, 2006), and the present study attempted to extend this research. Experimenters exposed 7 children (ages 7 to 10 years) to a simulated board game with concurrently available dice differing only by…
Descriptors: Cues, Addictive Behavior, Children, Discrimination Learning
Thirioux, Berangere; Jorland, Gerard; Bret, Michel; Tramus, Marie-Helene; Berthoz, Alain – Brain and Cognition, 2009
Researchers have recently reintroduced the own-body in the center of the social interaction theory. From the discovery of the mirror neurons in the ventral premotor cortex of the monkey's brain, a human "embodied" model of interindividual relationship based on simulation processes has been advanced, according to which we tend to embody…
Descriptors: Models, Interpersonal Relationship, Interaction, Brain Hemisphere Functions
Ochoa Alpala, Carol Anne; Roberto Flórez, Eliana Edith – HOW, 2011
Blended Learning has become one of the most common ways to teach EFL (English as a Foreign Language) due to its double component, which integrates Face-to-Face classes with virtual learning in order to offer students a wide range of materials and resources organized in a methodological way. Over the years, teachers and students have changed the…
Descriptors: Blended Learning, English (Second Language), Second Language Learning, Second Language Instruction
Stewart, Alice C.; Williams, Jacqueline; Smith-Gratto, Karen; Black, Sylvia Sloan; Kane, Betty Turner – Decision Sciences Journal of Innovative Education, 2011
In this pilot research we examine the impact of two leadership development training programs on the ability of students to acquire knowledge, share knowledge, and apply knowledge for organizational decision making. One program emphasized concepts and case-based application based on a technical learning paradigm. The other program used a game-based…
Descriptors: Leadership Training, Program Effectiveness, Decision Making, Learning
Thompson, Teri L. – ProQuest LLC, 2011
The purpose of this descriptive study was to examine the use of simulation technology within nursing programs leading to licensure as registered nurses. In preparation for this study the Use of Simulation Technology Inventory (USTI) was developed and based in the structure, processes, outcomes model and the current literature on simulation. The…
Descriptors: Student Evaluation, Teaching Methods, Undergraduate Students, Computer Simulation
American Journal of Distance Education, 2011
Larry Johnson has been the CEO of the New Media Consortium (NMC) for nearly a decade, and he has worked in higher education for more than twenty-five years. Before joining NMC, he served in roles that include faculty member, dean, provost, and president. In this interview, he talks about the position of NMC in distance education and the challenges…
Descriptors: Distance Education, Administrators, Interviews, Consortia
Conijn, Judith M.; Emons, Wilco H. M.; van Assen, Marcel A. L. M.; Sijtsma, Klaas – Multivariate Behavioral Research, 2011
The logistic person response function (PRF) models the probability of a correct response as a function of the item locations. Reise (2000) proposed to use the slope parameter of the logistic PRF as a person-fit measure. He reformulated the logistic PRF model as a multilevel logistic regression model and estimated the PRF parameters from this…
Descriptors: Monte Carlo Methods, Patients, Probability, Item Response Theory
Smith, Brian Daniel; Silk, Kami – Academic Psychiatry, 2011
Objective: This pilot study investigates the impact of an online, interactive simulation involving an Arab American Muslim patient on the knowledge, skills, and attitudes of 2nd-year medical students regarding culturally competent healthcare, both in general and specific to Arab American Muslim patients. Method: Participants (N = 199), were…
Descriptors: Experimental Groups, Medical Students, Muslims, Arabs
Lu, Lilly – Journal of Technology and Teacher Education, 2011
Three-dimensional (3D) virtual worlds (VW) have great potential for contemporary art education. This article introduces the key characteristics of 3D VWs and reviews the research literature and application of VWs in education and art education. After explaining how 3D VWs provide unique possibilities as a contemporary art medium, learning tool,…
Descriptors: Student Projects, Art Education, Art Teachers, Teacher Education Curriculum
Ramaswami, Rama – Campus Technology, 2011
Just a few years ago, virtual worlds were credited with the power to transform the universe. Used since the late 1990s in military and medical applications, virtual worlds first gained mainstream media attention when Linden Lab released Second Life in 2003. While other worlds, including open source environments, have launched since then (examples…
Descriptors: Foreign Countries, Computer Software, Technical Support, Computer Uses in Education
Davids, Mogamat Razeen; Chikte, Usuf M. E.; Halperin, Mitchell L. – Advances in Physiology Education, 2011
This article reports on the development and evaluation of a Web-based application that provides instruction and hands-on practice in managing electrolyte and acid-base disorders. Our teaching approach, which focuses on concepts rather than details, encourages quantitative analysis and a logical problem-solving approach. Identifying any dangers to…
Descriptors: Electronic Learning, Internal Medicine, Problem Solving, Internet
Unlu, Zeynep Koyunlu; Dokme, Ibilge – Turkish Online Journal of Educational Technology - TOJET, 2011
The purpose of this study was to investigate whether the combination of both analogy-based simulation and laboratory activities as a teaching tool was more effective than utilizing them separately in teaching the concepts of simple electricity. The quasi-experimental design that involved 66 seventh grade students from urban Turkish elementary…
Descriptors: Experimental Groups, Control Groups, Elementary School Students, Quasiexperimental Design
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Goldstain, Ofir H.; Ben-Gal, Irad; Bukchin, Yossi – IEEE Transactions on Learning Technologies, 2011
Remote learning has been an increasingly growing field in the last two decades. The Internet development, as well as the increase in PC's capabilities and bandwidth capacity, has made remote learning through the internet a convenient learning preference, leading to a variety of new interfaces and methods. In this work, we consider a remote…
Descriptors: Computer Uses in Education, Guidelines, Teaching Methods, Robotics

Peer reviewed
Direct link
