نتایج جستجو برای: assessing
تعداد نتایج: 156667 فیلتر نتایج به سال:
Over the past decade, iSchools have emerged to educate the next generation of information professionals and scholars. Claiming to be edgy and innovative, how can and should these scbools function in tbe spirit of assessment tbat now drives so much in the university? This essay, which explores how well we can assess iSchools, emerged from a doctoral seminar. Academic Culture and Practice, taugbt...
The views expressed in this paper are the views of the authors and do not necessarily reflect the views or policies of the Asian Development Bank (ADB), or its Board of Directors or the governments they represent. ADB makes no representation concerning and does not guarantee the source, originality, accuracy, completeness or reliability of any statement, information, data, finding, interpretati...
In the online environments some case studies we’ve developed and day-to-day experience have shown that, several times, online learning activities are promoted without considering the assessment of cognitive results that derive from those activities. Engaging students appears as the main justification. And when students’ involvement is not what it was expected? Should a student be penalized by n...
A technique is described that uses goals to assess the agility of software development teams and shows how it can be used with some examples. The agile assessment can be used to make investment decisions and process alterations. Value stream mapping is seen as an important technique in analysing processes.
Background: Oesophageal carcinoma is one of the most common cancers worldwide. Its incidence and mortality rates show a wide geographical variation at a world and regional level. Geographic mapping of age-standardized, cause-specific death rates at a municipal level could be a helpful and powerful tool for providing clues leading to a better understanding of its aetiology. Methods: This study s...
34 Published by the ieee ComPuter soCiety ■ 1540-7993/09/$25.00 © 2009 ieee ■ ieee seCurity & PrivaCy A public-key infrastructure is a collection of hardware, software, processes, and people that together provide security services based on public-key cryptography. Many countries, including Norway, Sweden, Denmark, Finland, Estonia, Austria, Belgium, and Canada, have introduced large-scale secur...
0
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید