Dissertations / Theses on the topic 'Personal uses of computer'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Personal uses of computer.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gingery, David L. "Pastoral uses of the personal computer." Theological Research Exchange Network (TREN), 1986. http://www.tren.com.
Full textSong, Yanjie. "Educational uses of PDAs (personal digital assistants) undergraduate student experiences /." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841410.
Full textSong, Yanjie, and 宋燕捷. "Educational uses of PDAs (personal digital assistants): undergraduate student experiences." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841410.
Full textKatule, Ntwa. "Utilization of personal health informatics through intermediary users." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.
Full textMurphy, Robert P., and Lorraine S. Davis. "Personal computer use at Navy Field Activities: a productivity study." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26161.
Full textDill, Byron. "Human robot interaction using a personal digital assistant interface : a study of feedback modes /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418012.
Full textParadesi, Sharon M. (Sharon Myrtle) 1986. "User-controlled privacy for personal mobile data." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93839.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 81-82).
Smartphones collect a wide range of sensor data, ranging from the basic, such as location, accelerometer, and Bluetooth, to the more advanced, such as heart rate. Mobile apps on the Android and iOS platforms provide users with "all-or-nothing" controls during installation to get permission for data collection and use. Users have to either agree to have the app collect and use all the requested data or not use the app at all. This is slowly changing with the iOS framework, which now allows users to turn off location sharing with specific apps even after installation. MIT Living Lab platform is a mobile app development platform that uses openPDS to provide MIT users with personal data stores but currently lacks user controls for privacy. This thesis presents PrivacyMate, a suite of tools for MIT Living Labs that provide user-controllable privacy mechanisms for mobile apps. PrivacyMate aims to enable users to maintain better control over their mobile personal data. It extends the model of iOS and allows users to select or deselect various types of data (more than just location information) for collection and use by apps. Users can also provide temporal and spatial specifications to indicate a context in which they are comfortable sharing their data with certain apps. We incorporate the privacy mechanisms offered by PrivacyMate into two mobile apps built on the MIT Living Lab platform: ScheduleME and MIT-FIT. ScheduleME enables users to schedule meetings without disclosing either their locations or points of interest. MIT-FIT enables users to track personal and aggregate high-activity regions and times, as well as view personalized fitness-related event recommendations. The MIT Living Lab team is planning to eventually deploy PrivacyMate and MIT-FIT to the entire MIT community.
by Sharon Myrtle Paradesi.
Elec. E. in Computer Science
Gwizdka, Jacek, and Mark Chignell. "Individual Differences in Personal Information Management." University of Washington Press, 2007. http://hdl.handle.net/10150/105751.
Full textWallace, John Glenn. "Speech synthesis using a digital modulation scheme on the IBM personal computer." Diss., Rolla, Mo. : School of Mines and Metallurgy of the University of Missouri, 1989. http://scholarsmine.mst.edu/thesis/pdf/Wallace_09007dcc805dc178.pdf.
Full textVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 9, 2009) Includes bibliographical references (p. 39-40).
Bylund, Markus. "Personal service environments : Openness and user control in user-service interaction." Licentiate thesis, Uppsala universitet, Avdelningen för datalogi, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86015.
Full textWeideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.
Full textComputer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in industry was measured by sending a questionnaire to 388 companies country-wide. &~ average of 2l,5% of the respondents claimed detrimental effects to information stored on disk due to computer viruses. This and other data was used to guide laboratory experiments on the actual damage done by computer viruses to stored information. A set of test disks was prepared to represent programs and data of a typical PC user in industry. Fifteen different virus programs were used individually to infect the test disks. After each infection, all the test disks were inspected to ascertain damage to data, system and program files as well as to separate disk sectors. The research established that: The damage done by computer viruses to stored information is generally limited to one file or disk area. Where damage to stored information did occur, it was often reversible. Irrational user responses to virus symptoms provide a large potential source for damage to stored information. The availability of master program disks (for program file restoration) and recent, validated data backup is essential to recovery from a computer virus infection. A user can solve most problems caused by virus infections if he has a basic understanding of disk structure, i.e. tracks, sectors, sides, the FAT, etc, and of the use of disk utility programs like Norton Utilities or PCTools. The fact that some of the findings of prominent virus researchers could not be verified, suggests that virus programs could be unstable. Claims regarding the damage inflicted by viruses must be considered to be valid only for a specific copy of the virus under discussion. The importance of using original application software (to minimize the transfer of viruses and to enable program file restoration) , regular back-ups (to enable data file restoration) and basic user awareness (infection prevention, symptoms, the use of anti-viral and utility programs, etc.) was emphasized. The average PC user should be able to clear up a virus infection without assistance by following the given disinfection procedure. Suggestions for further study include virus origins, generations, mutations, multiple infections, and the effect of viruses on computer networks.
Foster, Kristina 1981. "Context based specific user interfaces for the personal router." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28387.
Full textIncludes bibliographical references (p. 59-60).
For this thesis, I am concerned with the User Interface (UI) design of the Personal Router (PR), a device that dynamically selects wireless services in an open market on behalf of a mobile user [3]. The Personal Router chooses from a set of locally available services based on their Quality of Service (QoS) attributes as well as the user's preferences for these attributes, which the PR learns by interacting with the user [10]. To ensure accurate learning it is necessary that the PR/user interaction is both intuitive and non-obtrusive to the user and informative to the PR, often two conflict goals. Meeting both goals simultaneously requires a Context Based Specific User Interface that adjusts how it interacts with the user based on his context, where context is loosely defined as interaction constraints imposed by the user's environment, activity or situation. The context specific UI allows the PR to acquire the most informative user information for accurate learning while being as intuitive and non-obtrusive as possible. In this thesis, I present the design of the Context Based Specific UI as well as three different implemented UIs that vary in the amount of detail they allow the user to express. Although the less detailed UIs require less interaction from the user, the resulting learned information is not as accurate of the user's feelings and is based on assumptions of the user's behavior. The more detailed UIs have the opposite advantage and disadvantage. Finally, I present a method of combining the three Uls such that the user can select the one that best matches his current context.
by Kristina Foster.
M.Eng.
Aldeco, Perez Rocio. "Secure provenance-based auditing of personal data use." Thesis, University of Southampton, 2012. https://eprints.soton.ac.uk/340065/.
Full textClaar, Chester L. "The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model." DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/878.
Full textKant, Tanya. "Making it personal : web users and algorithmic personalisation." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/65082/.
Full textVarnadore, Michael Ray. "Examining the End-user Perspective of Personal Computer Security| A Qualitative Q Methodology Study." Thesis, University of Phoenix, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10808067.
Full textThe Personal Computer is one of the most versatile inventions of the modern world. From its introduction in the 1980s, businesses have used these devices to perform everything from routine administrative tasks to complex engineering activities. Without proper attention to the security, companies put their ongoing operations and data at risk of theft, alteration, or destruction. Employees using personal computing systems are the primary gatekeepers of intellectual property and at the same time are the source of most data breaches. The purpose of this study was to analyze attitudes and behavioral patterns of end-users who repeatedly fall victim to simulated phishing attacks. Using a Q-Methodology approach, participants rated their level of agreement or disagreement of statements collected from research about end-user attitude and training towards computer security. Analysis of participant responses yielded three factors that demonstrated a pattern of behavior and opinion and categorized participants into three groups; gatekeepers, oblivions, and conformists. Analysis of the three group’s alignment with the studies research questions reveals that although all groups are well trained in computer security procedure and policy, two of the groups demonstrate deficiency in recognizing cyber risk and understanding how to protect against the threat. For companies to be secure, the end-user must view themselves as the primary gatekeeper to protect intellectual property. Technology can be circumvented, passwords can be compromised, and systems can be penetrated. The most effective method therefore to combat cyber threat is to create a culture of vigilance that every end-user understands, accepts, and embraces as their primary responsibility.
Balakrishnan, Dineshbalu. "Design and implementation of a personal assistant for mobile device users using agent technology." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26571.
Full textShah, Tarun. "Generation of grey box use cases for personal communication systems using simple design machines." Thesis, University of Ottawa (Canada), 1995. http://hdl.handle.net/10393/10285.
Full textHarper, Jocelyn R. ""Please do not lean on the computer it has feelings too" the relationships transferred by humans to technology /." Access electronically, 2007. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20080904.120259/index.html.
Full textZerega, Bravo Rafael, and Borislav Lazarov. "To touch or not to touch : A comparison between traditional and touchscreen interface within personal computers." Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-15362.
Full textOphoff, Madri. "Distributing intelligence in the wireless control of a mobile robot using a personal digital assistant." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1355.
Full textPour, Shiva Abdi Farzaneh. "User Identification Roadmap towards 2020 : A study of personal identification challenges for ubiquitous computing world." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3485.
Full textThis thesis starts with thinking about the problems of the today’s identification; why we need to carry dozens of different magnetic cards, bunches of keys, or memorizing many digital pins and pass code? To do the study, I observed people at shopping and traveling to find out what and how people interact with tools, what are their behaviors, experiences, or reactions when they need to approve their identity. and what problems they encounter. Informal discussion with designers was the next step of empirical study. The analysis over collected data guided us into problems in today’s identifications: ‘Foreground activity’, ‘Diversity of tools and interactions’, ‘security’, ‘trust’ and ‘being economical’. Last section of the thesis is the investigating on current designs; RFID can be good solution for pervasive identification if the security and privacy of people respected. Mobile will be an inevitable part of every design in future. However, mobile phone designers should think about diversity of interface layouts that may be a barrier for unified identification interactions. Biometrics also seems the inevitable part of future of identification. Apart from technology, social engagement and supports, especially in terms of privacy is one of the most noticeable concerns. Information forensics, and level of awareness should be specified before the benefits of pervasive identifications threaten people’s privacies.
Wu, Justin Chun. "Peering Through the Cloud—Investigating the Perceptions and Behaviors of Cloud Storage Users." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6175.
Full textMorley, Deborah G. "Design and adaptation of a general purpose, user friendly statistical software package for the IBM personal computer and IBM PC compatibles (PC VSTAT)." Ohio : Ohio University, 1986. http://www.ohiolink.edu/etd/view.cgi?ohiou1183141969.
Full textHanrahan, Benjamin Vincent. "Getting Lost in Email: How and Why Users Spend More Time in Email than Intended." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/51204.
Full textPh. D.
Navarro, Sainz Adriana G. "An Exploratory Study: Personal Digital Technologies For Stress Care in Women." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543579225538012.
Full textNicholas, Michael P. "(Re)defining Relationships in a Mediated Context: Graduate Student Use of Synchronous Computer-Mediated Communication." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002400.
Full textWindingland, Kim, and John LaPlante. "Telemetry System User Interface for Windows™." International Foundation for Telemetering, 1993. http://hdl.handle.net/10150/611849.
Full textDue to the rapid advancement of technology in GUI design tools within Microsoft Windows™, a sophisticated human-machine interface can be developed for telemetry systems. A PC Windows™-based telemetry system would effectively provide a "bridge" between the telemetry world and the Windows™ world, bringing many low cost off-the-shelf software and hardware tools into the telemetry realm that has been unprecedented. This paper describes the results of such an approach in the development of Loral's Visual Telemetry System (VTS) software.
Tunnell, Harry D. IV. "Promoting common ground in a clinical setting| The impact of designing for the secondary user experience." Thesis, Indiana University - Purdue University Indianapolis, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10181724.
Full textPrimary users can create a user experience (UX) for others—secondary users—when interacting with a system in public. Common ground occurs when people have certain knowledge in common and each knows that they have this shared understanding. This research investigates how designing for a secondary UX improves common ground during a patient-provider first encounter. During formative work, patients and providers participated in telephonic interviews and answered online questionnaires so that their respective information requirements for clinical encounters could be understood. The outcome of the formative work was a smartphone application prototype to be used as the treatment in an experimental study. In a mixed methods study, with a patient role-player using the prototype during a simulated clinical encounter with 12 providers, the impact of the prototype upon secondary user satisfaction and common ground was assessed. The main finding was that the prototype was capable of positively impacting secondary user satisfaction and facilitating common ground in certain instances. Combining the notions of human-computer interaction design, common ground, and smartphone technology improved the efficiency and effectiveness of providers during the simulated face-to-face first encounter with a patient. The investigation substantiated the notion that properly designed interactive systems have the potential to provide a satisfactory secondary UX and facilitate common ground.
He, Wu. "The effects of conceptual description and search practice on users' mental models and information seeking in a case libray with a best match search mechanism." Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/5863.
Full textThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 21, 2008) Vita. Includes bibliographical references.
Gustafsson, Viktor. "Interacting with Intelligent Personal Assistants : Blending Voice and Chat Interaction to Improve Learnability." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-181881.
Full textLaTouche, Lerone W. "Usability Issues in the User Interfaces of Privacy-Enhancing Technologies." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/207.
Full textTanja, Rastad. "A Usability Evaluation of a Personal Video Recorder : Navigation and channel list management from a user perspective." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69546.
Full textBall, Albert. "A Comparison of Users' Personal Information Sharing Awareness, Habits, and Practices in Social Networking Sites and E-Learning Systems." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/84.
Full textParsons, John Scott. "Automated knowledge acquisition for knowledge-based systems, KE-RIT : the Use of Kelleys' personal construct theory in the automation of knowledge acquisitions (theory and prototype) /." Online version of thesis, 1992. http://hdl.handle.net/1850/11056.
Full textClaesson, Teresia. "The User Perspective on Recorder Functionality and Navigation Management : Result from a usability evaluation of a Personal Video Recorder." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69594.
Full textUppsatsen är egentligen på 18hp, var tvungen att fylla i 16hp då rätt alternativ inte fanns att tillgå.
Tillemans, Stephen. "Development of an instrument for data collection in a multidimensional scaling study of personal Web usage in the South African workplace." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/21646.
Full textIn a relatively very short period the Internet has grown from being virtually unknown to becoming an essential business tool. Together with its many benefits, the Internet has unfortunately brought with it several new organisational challenges. One of these challenges is how to manage personal Web usage (PWU) in the workplace effectively. Although many managers see PWU as a form of workplace deviance, many researchers have pointed out its potential benefits such as learning, time-saving, employee well-being and a source of ideas. To help organisations manage PWU in the workplace more effectively, this research realised the need for a typology of PWU behaviours in the South African workplace. Multidimensional scaling (MDS) was identified as an objective method of creating such a typology. The objective of this research was therefore to develop an instrument to gather data for a multidimensional scaling study of PWU behaviours in the South African workplace. A questionnaire was designed that consists of three distinct sections. The first section contains seven pre-coded demographics questions that correspond with specific demographic variables, proven to have a relationship with PWU. The second section of the questionnaire is designed to gather dissimilarity data for input into an MDS algorithm. To begin with, 25 Web usage behaviours of South Africans were identified using Google Ad Planner. After weighing up various options of comparing the Web usage behaviours, the pairwise comparison method was selected. Ross sequencing was used to reduce positioning and timing effects. To reduce the number of judgements per participant, the 300 required judgments are split six ways, resulting in 50 judgements per participant. The last section of the questionnaire is designed to gather data to assist with interpreting the dimensions of the MDS configuration. Eight benefits and risks of PWU were identified. These are combined into a matrix together with the 25 Web usage behaviours. The data from this section will allow future research to use linear regression to discover the relationship between the Web usage behaviours (the objects), and the benefits and risks of PWU (the variables). It is believed that this design offers a fair compromise between the time and effort required of participants and the quality and integrity of the acquired data.
Batie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.
Full textPagno, Bruno Lorandi. "Everyday visualization: discovering more about individuals." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/179522.
Full textPeople are becoming increasingly more interested in the use of activity monitors and selfimprovement. The availability of individuals’ data is also pushing the development of new applications and data visualization projects to be used at home, in science (e.g. to better understand the behavior of populations) or for governments interested in developing intelligent cities. In this work, we present an easy and intuitive set of visualizations to allow the exploration of personal data by common people. We focus on helping people to know themselves better and to make sense of their own data. Our visualizations are based on the metaphors of calendars, clocks, and maps, as well as on the use of bar charts to explore raw data. Data exploration is therefore guaranteed by the interaction between them. In order to evaluate our work we present two use cases, where few users observe and discuss the data from different points of view: the exploration of personal data for self-improvement purposes, and the use of Everyday Visualization by health scientists. Both use cases were ran without any training session. The resulting visualization aggregates several different data sources, going beyond many of the personal and casual visualization works. The promising results achieved demonstrated the viability of the use of such techniques for personal data visualizations and sense making.
Ericsson, Tomas, and Monika Nilqvist. "A Personalized Car : A study on how to apply personalization to a driver environment." Thesis, Linköping University, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7795.
Full textAn increasing amount of technology in cars makes new ideas and solutions necessary. This study will explore the idea of a personalized driver environment and investigate possible benefits and drawbacks with such a feature. The study consists of three parts: a pre-study exploring personalization, a survey investigating the attitudes towards personal settings, and finally an interview testing a specific solution. The survey was distributed in USA and Sweden while the interviews were conducted with Swedish subjects.
Overall, the concept of a personalized car has been well received. This study has shown that the most requested settings are associated with the driver position, hi-fi system and climate. The study also suggests that feeling in control of the personalization is more important than the benefits associated with automation. The user prefers visible solutions, such as a personal button on the key before hidden (e.g. using a button sequence or a menu system). Such a button promotes the feature while allowing the user to interact with the car in a familiar way. However, since little real user experience exists with such solutions it is important to continue research when further developing personalization of a car.
Hermansson, Elias. "Själv-monitorering för ökad motivation till bättre munhälsa : Kan en mobilapplikation vara del av lösningen?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15930.
Full textHultgren, Kim. "HUR MÅR JAG EGENTLIGEN? : Designriktlinjer för mobilapplikationer för self-monitoring vid bipolär sjukdom." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13927.
Full textWindingland, Kim L. "A DISTRIBUTED NETWORK ARCHITECTURE FOR PC-BASED TELEMETRY SYSTEMS." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/608384.
Full textThe ever-increasing power of PC hardware combined with the new operating systems available make the PC an excellent platform for a telemetry system. For applications that require multiple users or more processing power than a single PC, a network of PCs can be used to distribute data acquisition and processing tasks. The focus of this paper is on a distributed network approach to solving telemetry test applications. This approach maximizes the flexibility and expandability of the system while keeping the initial capital equipment expenditure low.
Amdahl, Per, and Per Chaikiat. "Personas as Drivers : - an alternative approach for creating scenarios for ADAS evaluation." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8621.
Full textResearch and development on vehicle safety has lately started to direct its focus towards how to actively support the driver and make it easier for her to drive safely through letting Advanced Driver Assistance Systems (ADAS) have effect on how the driver interacts with the vehicle and the surrounding traffic. This requires research on both how the driver and vehicle perform in different situations, in terms of psychology, cognition and individual differences. In addition, physical limitations and requirements of the driver and the vehicle must be taken into account. Therefore scenarios for evaluation of these systems are required. In the area of user-centered design a rather new method, Personas, is being adopted. This thesis tries to explore if the Persona method is a viable tool for creating scenarios for such evaluations. Experiences after completing this work imply that personas indeed is a viable way to include aspects and raise issues concerning individual variability and situational context in ADAS scenarios.
Galindo, Michel. "L'environnement informatique du gestionnaire : un progiciel d'aide a la decision." Toulouse 3, 1987. http://www.theses.fr/1987TOU30028.
Full textBesada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.
Full textLeijon, Jenny, and Anna Udén. "”Jag ser inte datorn som nått djävulens påfund, utan kan se vilka användningsmöjligheter som finns” : En kvalitativ studie om IKT-satsningar på förskolan." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-5229.
Full textIn today's society ICT-knowledge is viewed as an important skill for humans to function in society and business. Sources indicate motives which underline the importance of the fact that children at an early age are introduced to computing, as the computer becomes a tool to generate new knowledge and enable new ways of working. Based on a qualitative approach, we have studied the reasoning behind children's computer use in preschool. Semi-structured interviews were conducted with two principals to determine their opinions on educational benefits of and investments in ICT. On this basis we have also, through focus groups, studied what kind of thoughts teachers express on ICT in educational practice. From a sociocultural perspective terms like interaction, meaning and artifacts became central. The results show that the principals and teachers both have ambitions regarding the development of ICT work at the preschool, while the practical work occurs on a very small scale. The study further demonstrated that no real evaluation takes place regarding the ICT-investments in preschool. In the discussion we are critical to the lack of communication that is seen between principals and their teacher-teams regarding the implementation of ICT-investments in the practice. We also discuss the teachers’ need for further education regarding ICT-development and the underlying causes of the use of ICT today. In the conclusion we present guidelines for the development of ICT work in preschool.
Chong, Henry H. W. 1974. "Toward a personal quantum computer." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42797.
Full textIncludes bibliographical references (p. 115-118).
by Henry H.W. Chong.
M.Eng.
Wang, Jun. "Computer simulations of personal robots." Thesis, University of Ottawa (Canada), 1993. http://hdl.handle.net/10393/6477.
Full textXu, Zhilei. "Synthesizing framework uses from program behavior data." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66482.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 42-43).
This thesis presents MATCHMAKER, a new synthesis tool that aims to help programmers use software frameworks by synthesizing source code needed to interact with the framework. Software engineers of today are constantly faced with the task of using or extending large software code bases. This proves to be a challenging endeavor, as object-oriented frameworks tend to grow exceedingly intricate. Functionality is spread out among numerous classes and tailoring it for a specific need requires knowledge of exact components to extend and combine. MATCHMAKER is presented to help programmers understand such complex behavior, especially, to help deal with one common task in using frameworks: connecting two classes so that they can interact with each other. Taking as input two classes that the programmer want to connect, MATCHMAKER observes many real runs of the framework, aggregates relevant execution traces in which similar connections are built by client-framework interactions, and synthesizes the necessary source code the user needs to write to make the connection possible. MATCHMAKER relies on the hypothesis that the logical connection between two objects is fulfilled by a chain of pointer references linking them together, and the earliest possible pointer reference chain (called Critical Chain) is critical to the logical connection. MATCHMAKER employs a new program behavior data engine (called DELIGHT) to find the critical chain, uses a special slicing algorithm to dig out the relevant instructions which form the client-framework protocol from the critical chain, and synthesize the client code from the slices. In this thesis we also demonstrate MATCHMAKER's capability on a range of programming tasks using complex software frameworks such as Eclipse, and evaluate MATCHMAKER's usability and its improvement to programming efficiency by comprehensive user study.
by Zhilei Xu.
S.M.