Search
Now showing items 21-30 of 44
Concept mapping in computer science education
(Journal of Computing Sciences in Colleges, 2017)
Concept Map (CM) is a graphical tool for organizing and structuring knowledge by depicting concepts as nodes, and relationships between concepts as edges. It can be used as an effective tool for teaching, learning, and ...
Priority Ceiling Protocol in Ada
(Proceedings of the Tri-Ada '96 Conference, 1996-11)
The priority ceiling protocol (PCP) is an effective protocol for minimizing priority inversions in real-time scheduling. Priority inversion occurs when a high priority task is blocked by a low priority task, such as at a ...
Assessment Model and Practices for Computing and Information Systems Programs
(ISECON 2010 Proceedings, 2010)
Assessment of educational programs is one of the important means used in academia for accountability, accreditation, and improvement of program quality. The assessment practices, guidelines, and requirements are very broad ...
The STEM Behind BitCoin
(2018-02-08)
Bitcoin has become the first major cryptocurrency that has caught the fancy of the world by storm lately. Behind the hood of Bitcoin are many STEM innovations that will affect the world beyond cryptocurrency. Bitcoin is ...
Design of a distributed computer security lab
(Journal of Computing Sciences in Colleges, 2004)
Across the US and the rest of the world, there exists a lack of computer security components in many CS/IT curricula. For those programs that do have such components in computer security, a common difficulty is to integrate ...
An Optimal Algorithm For Reducing Edge-Solvable Mutual Exclusion Graphs
(The Computer Journal, 1994)
A mutual exclusion graph can be used to model a graphical mutual exclusion problem where a concurrent process is represented by a vertex and a mutual exclusion constraint between two processes is represented by an edge ...
Analysis and Metrics of XML Schema
(Proceedings of the 2004 International Conference on Software Engineering Research and Practice, 2004-06)
Despite the ubiquity of XML, research in metrics for XML documents is scarce. This paper proposes and discusses eleven metrics to measure the quality and complexity of XML Schema and conforming XML documents. To provide ...
Semaphore Solutions To General Mutual Exclusion Problems
(University of North Texas, Denton, 1988)
Automatic generation of starvation-free semaphore solutions to general mutual exclusion problems is discussed. A reduction approach is introduced for recognizing edge-solvable problems, together with an O(N^2) algorithm ...
Reflections on Proposal Writing and Management of a NSF STEM Scholarship Grant Program
(Journal of Computer Sciences in Colleges, 2007)
In recent years, the National Science Foundation (NSF) has established a Scholarship for Science, Technology, Engineering and Mathematics (S-STEM) program to fund universities for providing scholarship to academically ...
Design and Evolution of An Undergraduate Course on Internet Application Development
(Proceedings of the 9th annual SIGCSE conference on Innovation and technology in computer science education, 2004-06)
Web technologies have become essential in the computing curricula. However, teaching a Web development course to computing students is challenging because of large bodies of knowledge, rapidly changing technologies, demanding ...