Results 31 to 40 of about 215,398 (278)

Learning Dimensions: Lessons from Field Studies [PDF]

open access: yes, 2017
In this paper, we describe work to investigate the creation of engaging programming learning experiences. Background research informed the design of four fieldwork studies involving a range of age groups to explore how programming tasks could best be ...
Hughes, Janet   +2 more
core   +1 more source

Distance learning for training business game tutors

open access: yesBrazilian Journal of Operations & Production Management, 2017
This work is the result of research that proposes the incorporation of Distance Learning into a Business Game as a strategy to enhance tutor training, considering entrepreneurship difficulties faced by public school teachers. Part of the problem could be
Mariana de Toledo Marinho   +2 more
doaj   +1 more source

Group project work from the outset: an in-depth teaching experience report [PDF]

open access: yes, 2011
This article is an extended version of a paper that was submitted to 24th IEEE Conference on Software Engineering Education and Training, Honolulu, May 2011CONTEXT - we redesigned our undergraduate computing programmes to address problems of motivation ...
Shepperd, M
core   +1 more source

Penggunaan Media Interaktif Berbasis Web untuk Meningkatkan Motivasi dan Hasil Belajar (Studi Kasus di Universitas Abdurrab Pekanbaru Riau)

open access: yesJurnal Bina Praja, 2013
Abstrak Motivasi dan hasil belajar adalah dua faktor penting dalam menentukan efektivitas proses pembelajaran. Hasil belajar mata kuliah pemrograman berorientasi objek siswa rendah selama dua tahun terakhir.
Kori Cahyono
doaj   +1 more source

A metaobject architecture for fault-tolerant distributed systems : the FRIENDS approach [PDF]

open access: yes, 1998
The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed applications.
Fabre, Jean-Charles, Pérennou, Tanguy
core   +2 more sources

New Equations for Neutral Terms: A Sound and Complete Decision Procedure, Formalized [PDF]

open access: yes, 2013
The definitional equality of an intensional type theory is its test of type compatibility. Today's systems rely on ordinary evaluation semantics to compare expressions in types, frustrating users with type errors arising when evaluation fails to identify
Allais, Guillaume   +2 more
core   +2 more sources

Active Learning Methodologies for Increasing the Interest and Engagement in Computer Science Subjects in Vocational Education and Training

open access: yesEducation Sciences
Active learning strategies and methodologies place the students at the core of the learning process. The objective is to engage students in their own learning through significant activities that involve active participation. These activities are designed
Belkis Díaz-Lauzurica   +1 more
doaj   +1 more source

Using web-based peer assessment in fostering deep learning in computer programming [PDF]

open access: yes, 2004
Active learning is considered by many academics as an important and effective learning strategy. Students can improve the quality of their work by developing their higher cognitive skills through reflection on their own ideas and practice of analytic and
Joy, Mike, Sitthiworachart, Jirarat
core  

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Data transmission system with encryption by chaotic sequences

open access: yesTekhnologiya i Konstruirovanie v Elektronnoi Apparature, 2014
Protection of transferable information in the telecommunication systems is possible by its imposition of coding sequence on a plaintext. Encryption of pseudorandom sequences can be performed by using generation algorithms which are implemented on the ...
R. L. Politans’kyy   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy