Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Sciences
An Integrated Evaluation Method For Module-Based Undergraduate Information Retrieval Education, Yong Shi, Lei Zhu, Jane Wong, Bradley Sturz, Chun Tang
An Integrated Evaluation Method For Module-Based Undergraduate Information Retrieval Education, Yong Shi, Lei Zhu, Jane Wong, Bradley Sturz, Chun Tang
Faculty and Research Publications
In the Information Age, career and life-long learning increasingly depend on information-retrieval (IR) skills to utilize digital and on-line information effectively. Consequently, IR has become a valuable integral element of many disciplines. To address primary problems in the current college-level IR education, we have proposed a module-based curricular model that facilitates the development of an array of IR course modules that enable flexible adoption and integration. In addition, these modules can be designed to meet the specific needs of various disciplines and programs. This paper presents a preliminary integrated evaluation method which combines subjective and objective evaluation in order to …
A Taxonomy Of Free Network Sniffers For Teaching And Research, Victor A. Clincy, Halaweh Abu Nael
A Taxonomy Of Free Network Sniffers For Teaching And Research, Victor A. Clincy, Halaweh Abu Nael
Faculty and Research Publications
Today's networking environment has become very complex. Networks have been growing in size rapidly and have come to support more complex applications. As result, troubleshooting and maintaining networks has become cumbersome and has created the need for new specialized tools such as Network Protocol Analyzers, better known as "Network Sniffers".Network Sniffers have become critical tools in today's networking management and troubleshooting processes. They enable network managers to evaluate and examine the data running through their network by troubleshooting network performance problems and identifying certain network faults. Network Sniffers can help identify network attacks and detect security threats; they can be …