@Preamble{"\input bibnames.sty"
# "\ifx \undefined \circled \def \circled #1{(#1)}\fi"
# "\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-JERIC = "ACM Journal on Educational Resources in
Computing (JERIC)"}
@Article{Burger:2001:FST,
author = "C. Burger and K. Rothermel",
title = "A framework to support teaching in distributed
systems",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "3",
}
@Article{Cassel:2001:EIA,
author = "Lillian N. Cassel and Edward A. Fox",
title = "Editorial: introducing the {ACM Journal on Resources
in Computing}",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "1",
}
@Article{Fischer:2001:CES,
author = "Stephan Fischer",
title = "Course and exercise sequencing using metadata in
adaptive hypermedia learning systems",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "5",
}
@Article{Heller:2001:GGE,
author = "R. S. Heller",
title = "Greetings from the {Guest Editor}",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "2",
}
@Article{Heller:2001:UTM,
author = "Rachelle S. Heller and C. Dianne Martin and Nuzi
Haneef and Sonja Gievska-Krliu",
title = "Using a theoretical multimedia taxonomy framework",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "6",
}
@Article{Leidig:2001:LTO,
author = "Torsten Leidig",
title = "{L3}{---}towards an open learning environment",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "7",
}
@Article{Maly:2001:IHJ,
author = "R. Maly and H. Abdel-Wahab and C. Wild and C. M.
Overstreet and A. Gupta and A. Abdel-Hamid and S.
Ghanem and A. Gonzalez and X. Zhu",
title = "{IRI-h}, a {Java-based} distance education system:
architecture and performance",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "8",
}
@Article{Saddik:2001:RAI,
author = "Abdulmotaleb El Saddik and Stephan Fischer and Ralf
Steinmetz",
title = "Reusability and adaptability of interactive resources
in {Web-based} educational systems",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "4",
}
@Article{Shirmohammadi:2001:WBM,
author = "Shervin Shirmohammadi and Abdulmotaleb El Saddik and
Nicolas D. Georganas and Ralf Steinmetz",
title = "{Web}-based multimedia tools for sharing educational
resources",
journal = j-JERIC,
volume = "1",
number = "1es",
pages = "??--??",
month = mar,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "9",
}
@Article{Balci:2001:AAL,
author = "Osman Balci and William S. Gilley and Robin J. Adams
and Emre Tunar and N. Dwight Barnette",
title = "Animations to Assist Learning Some Key Computer
Science Topics",
journal = j-JERIC,
volume = "1",
number = "2es",
pages = "??--??",
month = "Summer",
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "5",
}
@Article{Ben-Ari:2001:IED,
author = "Mordechai Ben-Ari",
title = "Interactive execution of distributed algorithms",
journal = j-JERIC,
volume = "1",
number = "2es",
pages = "??--??",
month = "Summer",
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "2",
}
@Article{Anido-Rifon:2001:SSI,
author = "L. Anido-Rif{\'o}n and M. J. Fern{\'a}ndez-Iglesias
and M. Llamas-Nistal and M. Caeiro-Rodr{\'\i}guez and
J. Santos-Gago and J. S. Rodr{\'\i}guez-Est{\'e}vez",
title = "A component model for standardized {Web}-based
education",
journal = j-JERIC,
volume = "1",
number = "2es",
pages = "??--??",
month = "Summer",
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "1",
}
@Article{Hampel:2001:SSI,
author = "Thorsten Hampel and Reinhard Keil-Slawik",
title = "{sTeam}: structuring information in team-distributed
knowledge management in cooperative learning
environments",
journal = j-JERIC,
volume = "1",
number = "2es",
pages = "??--??",
month = "Summer",
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "3",
}
@Article{Shang:2001:IDE,
author = "Yi Shang and Hongchi Shi and Su-Shing Chen",
title = "An intelligent distributed environment for active
learning",
journal = j-JERIC,
volume = "1",
number = "2es",
pages = "??--??",
month = "Summer",
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "4",
}
@Article{JTFCC:2001:CC,
author = "{The Joint Task Force on Computing Curricula}",
title = "Computing curricula 2001",
journal = j-JERIC,
volume = "1",
number = "3es",
pages = "??--??",
month = "Fall",
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:36 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "1",
}
@Article{Yurcik:2001:E,
author = "William Yurcik",
title = "Editorial",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "1--3",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Decker:2001:PMS,
author = "Rick Decker and Stuart Hirshfield",
title = "The {PIPPIN} machine: simulations of language
processing",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "4--17",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Menczer:2001:OTR,
author = "Filippo Menczer and Alberto Maria Segre",
title = "{OAMulator}: a teaching resource to introduce computer
architecture concepts",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "18--30",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Braught:2001:KSC,
author = "Grant Braught and David Reed",
title = "The knob \& switch computer: a computer architecture
simulator for introductory computer science",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "31--45",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Skrien:2001:CST,
author = "Dale Skrien",
title = "{CPU Sim 3.1}: a tool for simulating computer
architectures for computer organization classes",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "46--59",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "http://www.cs.colby.edu/djskrien/CPUSim",
lastaccessed = "17 November 2012",
acknowledgement = ack-nhfb,
}
@Article{Yehezkel:2001:TST,
author = "Cecile Yehezkel and William Yurcik and Murray Pearson
and Dean Armstrong",
title = "Three simulator tools for teaching computer
architecture: {Little Man} computer, and {RTLSim}",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "60--80",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Osborne:2001:PC,
author = "Hugh Osborne",
title = "The {Postroom Computer}",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "81--110",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Wainer:2001:UAS,
author = "Gabriel A. Wainer and Sergio Daicz and Luis F. De
Simoni and Demian Wassermann",
title = "Using the {Alfa-1} simulated processor for educational
purposes",
journal = j-JERIC,
volume = "1",
number = "4",
pages = "111--151",
month = dec,
year = "2001",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Yurcik:2002:SIS,
author = "William (Bill) Yurcik",
title = "Special issue on {\em specialized\/} computer
architecture simulators that see the present and may
hold the future",
journal = j-JERIC,
volume = "2",
number = "1",
pages = "1--3",
month = mar,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Burch:2002:LGS,
author = "Carl Burch",
title = "{Logisim}: a graphical system for logic circuit design
and simulation",
journal = j-JERIC,
volume = "2",
number = "1",
pages = "5--16",
month = mar,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Shelburne:2002:PEP,
author = "Brian J. Shelburne",
title = "A {PDP-8} emulator program",
journal = j-JERIC,
volume = "2",
number = "1",
pages = "17--47",
month = mar,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1145/545197.545200",
ISSN = "1531-4278",
bibdate = "Thu Aug 07 17:10:23 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "The clean, simple, and elegant architecture of the
classic PDP-8 makes it an ideal candidate for studying
concepts in computer organization. The PDP-8 emulator
program allows a user to write, edit, assemble, debug,
trace, and execute PDP-8 machine code and PDP-8
assembler language programs. With it, the user can
obtain a feel for the PDP-8. The PDP-8 emulator program
includes a simple built-in text editor which is used to
write and edit PDP-8 assembler language programs, an
assembler to translate these programs into PDP-8
machine code, and a virtual PDP-8 engine upon which to
execute the code. PDP-8 code can be executed from a
debug screen display that allows the user to observe
the contents of registers and memory as the code
executes or code can be executed using an I/O interface
that requires user-written PDP-8 I/O routines. This
article provides an introduction to both the PDP-8
architecture and PDP-8 assembler language and discusses
how to use the PDP-8 emulator program. The PDP-8
emulator program runs under MS-DOS in a command
window.",
acknowledgement = ack-nhfb,
keywords = "virtual machine",
}
@Article{Dugan:2002:SIS,
author = "B. Dugan and J. Zahorjan",
title = "The {Sloop ISA} and the {SMOK} toolkit",
journal = j-JERIC,
volume = "2",
number = "1",
pages = "49--71",
month = mar,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Moure:2002:KS,
author = "J. C. Moure and Dolores I. Rexachs and Emilio Luque",
title = "The {KScalar} simulator",
journal = j-JERIC,
volume = "2",
number = "1",
pages = "73--116",
month = mar,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Roblitz:2002:LSE,
author = "Thomas R{\"o}blitz and Frank Mueller and Oliver
B{\"u}hn",
title = "{LegoSim}: simulation of embedded kernels over
{Pthreads}",
journal = j-JERIC,
volume = "2",
number = "1",
pages = "117--130",
month = mar,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Hoganson:2002:HPC,
author = "Kenneth E. Hoganson",
title = "High-performance computer architecture and algorithm
simulator",
journal = j-JERIC,
volume = "2",
number = "1",
pages = "131--148",
month = mar,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Brady:2002:JPB,
author = "Alyce Brady and R. C. McDowell and Kelly Schultz",
title = "{JavaScript} programming basics: a laboratory series
for beginning programmers",
journal = j-JERIC,
volume = "2",
number = "2",
pages = "1--1",
month = jun,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Carlisle:2002:RI,
author = "Martin C. Carlisle and Keith Shomper",
title = "{ROBOT} interpreter",
journal = j-JERIC,
volume = "2",
number = "2",
pages = "2--2",
month = jun,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Fagin:2002:AMU,
author = "Barry Fagin",
title = "{Ada\slash Mindstorms 2.0} user's guide and reference
manual",
journal = j-JERIC,
volume = "2",
number = "2",
pages = "3--3",
month = jun,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Ginat:2002:EBP,
author = "David Ginat",
title = "Effective binary perspectives in algorithmic problem
solving",
journal = j-JERIC,
volume = "2",
number = "2",
pages = "4--4",
month = jun,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Conn:2002:IPV,
author = "Richard Conn",
title = "Introduction to programming with {Visual Basic}",
journal = j-JERIC,
volume = "2",
number = "3",
pages = "1--1",
month = sep,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Humphries:2002:IC,
author = "Jeffrey W. Humphries and Martin C. Carlisle",
title = "Introduction to {Cryptography}",
journal = j-JERIC,
volume = "2",
number = "3",
pages = "2--2",
month = sep,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Conn:2002:SSR,
author = "Richard Conn",
title = "Software Systems Requirements",
journal = j-JERIC,
volume = "2",
number = "4",
pages = "1--1",
month = dec,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Fagin:2002:QAE,
author = "Barry S. Fagin and Laurence Merkle",
title = "Quantitative analysis of the effects of robots on
introductory {Computer Science} education",
journal = j-JERIC,
volume = "2",
number = "4",
pages = "1--17",
month = dec,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Griswold:2002:TSE,
author = "William G. Griswold",
title = "Teaching Software Engineering in a Compiler Project
Course",
journal = j-JERIC,
volume = "2",
number = "4",
pages = "1--18",
month = dec,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Joy:2002:IWB,
author = "Mike Joy and Boris Muzykantskii and Simon Rawles and
Michael Evans",
title = "An Infrastructure for {Web}-Based Computer-Assisted
Learning",
journal = j-JERIC,
volume = "2",
number = "4",
pages = "1--19",
month = dec,
year = "2002",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Gilder:2003:VTS,
author = "Jason Gilder and Michael Peterson and Jason Wright and
Travis Doom",
title = "A versatile tool for student projects: an {ASM}
programming language for the {Lego} mindstorm",
journal = j-JERIC,
volume = "3",
number = "1",
pages = "1--14",
month = mar,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Silva:2003:WTU,
author = "Elaine Silva and Dilvan Moriera",
title = "{WebCoM}: a tool to use peer review to improve student
interaction",
journal = j-JERIC,
volume = "3",
number = "1",
pages = "1--14",
month = mar,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Carr:2003:TPT,
author = "Steve Carr and Jean Mayo and Ching-Kuang Shene",
title = "{ThreadMentor}: a pedagogical tool for multithreaded
programming",
journal = j-JERIC,
volume = "3",
number = "1",
pages = "1--30",
month = mar,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Feb 3 18:43:37 MST 2004",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Holliday:2003:ACN,
author = "Mark A. Holliday",
title = "Animation of computer networking concepts",
journal = j-JERIC,
volume = "3",
number = "2",
pages = "1--26",
month = jun,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:40 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Null:2003:MMC,
author = "Linda Null and Julia Lobur",
title = "{MarieSim}: {The} {MARIE} computer simulator",
journal = j-JERIC,
volume = "3",
number = "2",
pages = "1--29",
month = jun,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:40 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Chau:2003:TKT,
author = "Michael Chau and Zan Huang and Hsinchun Chen",
title = "Teaching key topics in computer science and
information systems through a {Web} search engine
project",
journal = j-JERIC,
volume = "3",
number = "3",
pages = "1--14",
month = sep,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:41 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Edwards:2003:ISP,
author = "Stephen H. Edwards",
title = "Improving student performance by evaluating how well
students test their own programs",
journal = j-JERIC,
volume = "3",
number = "3",
pages = "1--24",
month = sep,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:41 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Blank:2003:PPB,
author = "Douglas Blank and Deepak Kumar and Lisa Meeden and
Holly Yanco",
title = "{Pyro}: a {Python}-based versatile programming
environment for teaching robotics",
journal = j-JERIC,
volume = "3",
number = "4",
pages = "1--15",
month = dec,
year = "2003",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:41 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Bair:2005:SIG,
author = "Bettina Bair and J. McGrath Cohoon",
title = "Special issue on gender-balancing computing
education",
journal = j-JERIC,
volume = "4",
number = "1",
pages = "1--1",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:42 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Werner:2005:PPH,
author = "Linda L. Werner and Brian Hanks and Charlie McDowell",
title = "Pair-programming helps female computer science
students",
journal = j-JERIC,
volume = "4",
number = "1",
pages = "1--8",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:42 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{McKenna:2005:GBB,
author = "Peter McKenna",
title = "Gender and black boxes in the programming curriculum",
journal = j-JERIC,
volume = "4",
number = "1",
pages = "1--12",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:42 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Lester:2005:CGP,
author = "Cynthia Y. Lester and Marcus Brown",
title = "Creating gender parity: an instruction aide's
influence",
journal = j-JERIC,
volume = "4",
number = "1",
pages = "1--14",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:42 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Berenson:2005:VWS,
author = "Sarah B. Berenson and Kelli M. Slaten and Laurie
Williams and Chih-Wei Ho",
title = "Voices of women in a software engineering course:
reflections on collaboration",
journal = j-JERIC,
volume = "4",
number = "1",
pages = "1--18",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:42 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Garvin-Doxas:2005:CCS,
author = "Kathy Garvin-Doxas and Lecia J. Barker",
title = "Communication in computer science classrooms:
understanding defensive climates as a means of creating
supportive behaviors",
journal = j-JERIC,
volume = "4",
number = "1",
pages = "1--18",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Tue Apr 26 17:40:42 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Kumar:2004:ISIa,
author = "Deepak Kumar",
title = "Introduction to special issue on robotics in
undergraduate education",
journal = j-JERIC,
volume = "4",
number = "2",
pages = "1--1",
month = jun,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Thu Jul 7 12:24:09 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
remark = "Although this issue is dated June 2004, it was not
published until July 2005.",
}
@Article{Verner:2004:RCL,
author = "Igor M. Verner and David J. Ahlgren",
title = "Robot contest as a laboratory for experiential
engineering education",
journal = j-JERIC,
volume = "4",
number = "2",
pages = "2--2",
month = jun,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Thu Jul 7 12:24:09 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Kitts:2004:IFR,
author = "Christopher Kitts and Neil Quinn",
title = "An interdisciplinary field robotics program for
undergraduate computer science and engineering
education",
journal = j-JERIC,
volume = "4",
number = "2",
pages = "3--3",
month = jun,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Thu Jul 7 12:24:09 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Sklar:2004:URU,
author = "Elizabeth Sklar and Simon Parsons and Peter Stone",
title = "Using {RoboCup} in university-level computer science
education",
journal = j-JERIC,
volume = "4",
number = "2",
pages = "4--4",
month = jun,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Thu Jul 7 12:24:09 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Kumar:2004:ISIb,
author = "Deepak Kumar",
title = "Introduction to special issue on robotics in
undergraduate education",
journal = j-JERIC,
volume = "4",
number = "3",
pages = "1--1",
month = sep,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Sat Sep 17 14:21:54 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Imberman:2004:IAA,
author = "Susan P. Imberman",
title = "An intelligent agent approach for teaching neural
networks using {LEGO\reg{}} handy board robots",
journal = j-JERIC,
volume = "4",
number = "3",
pages = "1--12",
month = sep,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Sat Sep 17 14:21:54 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Blank:2004:PPB,
author = "Douglas Blank and Deepak Kumar and Lisa Meeden and
Holly Yanco",
title = "{Pyro}: a python-based versatile programming
environment for teaching robotics",
journal = j-JERIC,
volume = "4",
number = "3",
pages = "1--15",
month = sep,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Sat Sep 17 14:21:54 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Kumar:2004:TYU,
author = "Amruth N. Kumar",
title = "Three years of using robots in an artificial
intelligence course: lessons learned",
journal = j-JERIC,
volume = "4",
number = "3",
pages = "1--15",
month = sep,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Sat Sep 17 14:21:54 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{White:2004:SBN,
author = "Daniel R. White and Mike S. Joy",
title = "Sentence-based natural language plagiarism detection",
journal = j-JERIC,
volume = "4",
number = "4",
pages = "1--20",
month = dec,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Sat Sep 17 14:21:54 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Diwan:2004:PDS,
author = "Amer Diwan and William M. Waite and Michele H. Jackson
and Jacob Dickerson",
title = "{PL-detective}: a system for teaching programming
language concepts",
journal = j-JERIC,
volume = "4",
number = "4",
pages = "1--22",
month = dec,
year = "2004",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Sat Sep 17 14:21:54 MDT 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Kuban:2005:CMP,
author = "Paul A. Kuban and Rammohan K. Ragade",
title = "The {CAN} microcluster: {Parallel} processing over the
controller area network",
journal = j-JERIC,
volume = "5",
number = "1",
pages = "1--12",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Nov 23 05:13:45 MST 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Feldman:2005:TQO,
author = "Yishai A. Feldman",
title = "Teaching quality object-oriented programming",
journal = j-JERIC,
volume = "5",
number = "1",
pages = "1--16",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Nov 23 05:13:45 MST 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Carroll:2005:CLT,
author = "John M. Carroll and Mary Beth Rosson",
title = "A case library for teaching usability engineering:
{Design} rationale, development, and classroom
experience",
journal = j-JERIC,
volume = "5",
number = "1",
pages = "1--22",
month = mar,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Nov 23 05:13:45 MST 2005",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Sutner:2005:CTD,
author = "Klaus Sutner",
title = "{CDM}: {Teaching} discrete mathematics to computer
science majors",
journal = j-JERIC,
volume = "5",
number = "2",
pages = "1--11",
month = jun,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Aug 23 12:04:05 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Cigas:2005:TPA,
author = "John Cigas and Wen-Jung Hsin",
title = "Teaching proofs and algorithms in discrete mathematics
with online visual logic puzzles",
journal = j-JERIC,
volume = "5",
number = "2",
pages = "1--12",
month = jun,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Aug 23 12:04:05 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Harvey:2005:ESI,
author = "Valerie J. Harvey and Susan H. Rodger",
title = "Editorial for the special issue on software support
for teaching discrete mathematics",
journal = j-JERIC,
volume = "5",
number = "2",
pages = "1--16",
month = jun,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Aug 23 12:04:05 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Cogliati:2005:RPV,
author = "Joshua J. Cogliati and Frances W. Goosey and Michael
T. Grinder and Bradley A. Pascoe and Rockford J. ROSS
and Cheston J. Williams",
title = "Realizing the promise of visualization in the theory
of computing",
journal = j-JERIC,
volume = "5",
number = "2",
pages = "1--17",
month = jun,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Aug 23 12:04:05 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Gegg-Harrison:2005:CCM,
author = "Timothy S. Gegg-Harrison",
title = "Constructing contracts: {Making} discrete mathematics
relevant to beginning programmers",
journal = j-JERIC,
volume = "5",
number = "2",
pages = "1--28",
month = jun,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Aug 23 12:04:05 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
}
@Article{Brusilovsky:2005:IES,
author = "Peter Brusilovsky and Sergey Sosnovsky",
title = "Individualized exercises for self-assessment of
programming knowledge: {An} evaluation of {QuizPACK}",
journal = j-JERIC,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Sep 27 05:45:30 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "6",
}
@Article{Brusilovsky:2005:PSI,
author = "Peter Brusilovsky and Colin Higgins",
title = "Preface to the special issue on automated assessment
of programming assignments",
journal = j-JERIC,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Sep 27 05:45:30 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "1",
}
@Article{Douce:2005:ATB,
author = "Christopher Douce and David Livingstone and James
Orwell",
title = "Automatic test-based assessment of programming: a
review",
journal = j-JERIC,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Sep 27 05:45:30 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "4",
}
@Article{Higgins:2005:AAE,
author = "Colin A. Higgins and Geoffrey Gray and Pavlos
Symeonidis and Athanasios Tsintsifas",
title = "Automated assessment and experiences of teaching
programming",
journal = j-JERIC,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Sep 27 05:45:30 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "5",
}
@Article{Joy:2005:BOS,
author = "Mike Joy and Nathan Griffiths and Russell Boyatt",
title = "The boss online submission and assessment system",
journal = j-JERIC,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Sep 27 05:45:30 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "2",
}
@Article{Kumar:2005:GPA,
author = "Amruth N. Kumar",
title = "Generation of problems, answers, grade, and
feedback---case study of a fully automated tutor",
journal = j-JERIC,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Sep 27 05:45:30 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "3",
}
@Article{Malmi:2005:EAA,
author = "Lauri Malmi and Ville Karavirta and Ari Korhonen and
Jussi Nikander",
title = "Experiences on automatically assessed algorithm
simulation exercises with different resubmission
policies",
journal = j-JERIC,
volume = "5",
number = "3",
pages = "??--??",
month = sep,
year = "2005",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Wed Sep 27 05:45:30 MDT 2006",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "7",
}
@Article{Turner:2005:MMA,
author = "Scott A. Turner and Manuel A. P{\'e}rez-Qui{\~n}ones
and Stephen H. Edwards",
title = "{minimUML}: a minimalist approach to {UML}
diagramming for early computer science education",
journal = j-JERIC,
volume = "5",
number = "4",
pages = "1:1--1:??",
month = dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1145/1186639.1186640",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:03 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "In introductory computer science courses, the Unified
Modeling Language (UML) is commonly used to teach basic
object-oriented design. However, there appears to be a
lack of suitable software to support this task. Many of
the available programs that support UML focus on
developing code and not on enhancing learning. Programs
designed for educational use sometimes have poor
interfaces or are missing common and important features
such as multiple selection and undo/redo. Hence the
need for software that is tailored to an instructional
environment and that has all the useful and needed
functionality for that specific task. This is the
purpose of minimUML. It provides a minimum amount of
UML, just what is commonly used in beginning
programming classes, and a simple, usable interface. In
particular, minimUML is designed to support abstract
design while supplying features for exploratory
learning and error avoidance. It supports functionality
that includes multiple selection, undo/redo, flexible
printing, cut and paste, and drag and drop. In
addition, it allows for the annotation of diagrams,
through text or free-form drawings, so students can
receive feedback on their work. minimUML was developed
with the goals of supporting ease of use, of supporting
novice students, and of requiring no prior training for
its use. This article presents the rationale behind the
minimUML design, a description of the tool, and the
results of usability evaluations and student feedback
on the use of the tool.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "education; human-computer interaction; learning;
minimalist design; UML",
}
@Article{Soh:2005:FCC,
author = "Leen-Kiat Soh and Ashok Samal and Gwen Nugent",
title = "A framework for {CS1} closed laboratories",
journal = j-JERIC,
volume = "5",
number = "4",
pages = "2:1--2:??",
month = dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1145/1186639.1186641",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:03 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Closed laboratories are becoming an increasingly
popular approach to teaching introductory computer
science courses, as they facilitate structured
problem-solving and cooperation. However, most closed
laboratories have been designed and implemented without
embedded instructional research components for constant
evaluation of the laboratories' effectiveness. As a
result, it is not convenient to maintain and improve
the laboratories over time so that they adapt to
changing CS topics, curricula, and student needs. This
article reports on an integrated framework for
designing, implementing, and maintaining laboratories
with embedded instructional research design. Although
the activities reported here are part of our
department-wide effort to cover CS0, CS1, and CS2, we
focus here on the design and implementation of the labs
for CS1.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "closed laboratories; cooperative learning;
instructional design",
}
@Article{Grimes:2005:CGI,
author = "Douglas Grimes and Mark Warschauer and Tara Hutchinson
and Falko Kuester",
title = "Computer graphics instruction in {VizClass}",
journal = j-JERIC,
volume = "5",
number = "4",
pages = "3:1--3:??",
month = dec,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1145/1186639.1186642",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:03 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "VizClass is a university classroom environment
designed to offer students in computer graphics and
engineering courses up-to-date visualization
technologies. Three digital whiteboards and a
three-dimensional stereoscopic display provide
complementary display surfaces. Input devices include
touchscreens on the digital whiteboards, remote
keyboards, data gloves, and hand-position sensors. We
use observations, interviews, and surveys to examine
the pedagogical impacts of VizClass for teaching and
learning computer graphics and virtual reality.
Preliminary findings include positive student and
teacher attitudes and greater learner engagement in
after-class collaborations.",
acknowledgement = ack-nhfb,
articleno = "3",
keywords = "engagement; graphics programming; visualization
classroom; visualization environment; VizClass",
}
@Article{Roy:2006:DEP,
author = "Geoffrey G. Roy",
title = "Designing and explaining programs with a literate
pseudocode",
journal = j-JERIC,
volume = "6",
number = "1",
pages = "1:1--1:??",
month = mar,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1217862.1217863",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:12 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Designing and explaining programs are often difficult
tasks, especially when novices are involved. It also
concerns more experienced programmers when complex
algorithms need to be carefully explained and
documented as part of software development. Good
practice suggests that code and documentation be
tightly coupled; but there are only a few support tools
specifically targeted at novices that require this as
an integral part of the programming process. We propose
a new tool design with this objective in mind: P-Coder
gives a flexible descriptive view of the program via
pseudocode notation within a graphical tree-structured
model, from which the complete algorithm can be
specified to retain the informal description integrated
with the final code. Thus the code meets some of the
key requirements for realizing a literate program.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "literate programming; novices; pseudocode",
}
@Article{Marshall:2006:MDL,
author = "Byron B. Marshall and Hsinchun Chen and Rao Shen and
Edward A. Fox",
title = "Moving digital libraries into the student learning
space: {The} {GetSmart} experience",
journal = j-JERIC,
volume = "6",
number = "1",
pages = "2:1--2:??",
month = mar,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1217862.1217864",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:12 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "The GetSmart system was built to support theoretically
sound learning processes in a digital library
environment by integrating course management, digital
library, and concept mapping components to support a
constructivist, six-step, information search process.
In the fall of 2002 more than 100 students created 1400
concept maps as part of selected computing classes
offered at the University of Arizona and Virginia Tech.
Those students conducted searches, obtained course
information, created concept maps, collaborated in
acquiring knowledge, and presented their knowledge
representations. This article connects the design
elements of the GetSmart system to targeted
concept-map-based learning processes, describes our
system and research testbed, and analyzes our system
usage logs. Results suggest that students did in fact
use the tools in an integrated fashion, combining
knowledge representation and search activities. After
concept mapping was included in the curriculum, we
observed improvement in students' online quiz scores.
Further, we observed that students in groups
collaboratively constructed concept maps with multiple
group members viewing and updating map details.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "concept maps; digital libraries; education",
}
@Article{Teo:2006:KDM,
author = "Chao Boon Teo and Robert Kheng Leng Gay",
title = "A knowledge-driven model to personalize e-learning",
journal = j-JERIC,
volume = "6",
number = "1",
pages = "3:1--3:??",
month = mar,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1217862.1217865",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:12 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This article highlights basic issues that have
hindered e-learning systems from becoming the
revolutionary force it could be for education. While
current systems aim to foster significant improvements
in learning, this article argues that most systems are
still limited to just being online repositories. This
and the lack of learning personalization has become a
topic for research. A knowledge-driven model to
personalize e-learning is proposed in this article. A
novel methodology for eliciting and personalizing tacit
knowledge is presented. We focus on describing the
complex information processing in terms of knowledge,
rather than the details of its implementation.",
acknowledgement = ack-nhfb,
articleno = "3",
keywords = "concept map; distance learning; e-learning;
instructional design; knowledge management",
}
@Article{Koldehofe:2006:LEE,
author = "Boris Koldehofe and Marina Papatriantafilou and
Philippas Tsigas",
title = "{LYDIAN}: {An} extensible educational animation
environment for distributed algorithms",
journal = j-JERIC,
volume = "6",
number = "2",
pages = "1:1--1:??",
month = jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1236201.1236202",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:19 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "LYDIAN is an environment to support the teaching and
learning of distributed algorithms. It provides a
collection of distributed algorithms as well as
continuous animations. Users can combine algorithms and
animations with arbitrary network structures defining
the interconnection and behavior of the distributed
algorithm. Further, it facilitates the creation of
algorithm descriptions as well as the creation of
network structures. This makes LYDIAN a flexible tool
to be used with students with different skills and
backgrounds. This article gives an overview about
various ideas and concepts behind LYDIAN by describing
in detail the framework for an educational
visualization and simulation environment for
learning/teaching distributed algorithms as well as
discussing possible extensions, which may improve
possibilities for user interaction. Moreover, in our
effort to understand better what visualization and
simulation environments, such as LYDIAN, need to
provide, we show results taken from a case study
integrating LYDIAN in an undergraduate
distributed-systems course.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "distributed algorithms",
}
@Article{Nutt:2006:ASC,
author = "Gary Nutt",
title = "Addressing small computers in the first {OS} course",
journal = j-JERIC,
volume = "6",
number = "2",
pages = "2:1--2:??",
month = jun,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1236201.1236203",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:19 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Small computers are emerging as important components
of the contemporary computing scene. Their operating
systems vary from specialized software for an embedded
system to the same style of OS used on a generic
desktop or server computer. This article describes a
course in which systems are classified by their
hardware capability and the traditional OS topic areas
are then dissected, augmented, reassembled, and
reorganized to illustrate the aspects of each topic as
applicable to each class of small computers.
Ultimately, the course covers the same material as a
conventional OS course, but from a new perspective.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "dedicated systems; embedded systems; managed
processes; OS organization; small computers; trusted
processes",
}
@Article{Frincke:2006:ESI,
author = "D. Frincke and S. Oudekirk and B. Popovsky",
title = "Editorial: {Special} issue on resources for the
computer security and information assurance curriculum:
{Issue 1}",
journal = j-JERIC,
volume = "6",
number = "3",
pages = "1:1--1:??",
month = sep,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1243481.1243482",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:25 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This editorial introduces a set of articles in the
JERIC special issue on resources for the computer
security and information assurance curriculum. It
begins with a discussion of why such a special edition
is needed and continues by outlining the articles in
this volume, as follows: an innovative model for
security education based on teaching hospitals;
teaching context in computer security through
metaphors; tools supporting exploration of
cryptography; suggestions for a hands-on Linux course
geared towards a student population that includes
noncomputer scientists; and finally, projects suitable
for a course in computer forensics.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "computer forensics; protection; security",
}
@Article{Goel:2006:IMI,
author = "Sanjay Goel and Damira Pon and Peter Bloniarz and
Robert Bangert-Drowns and George Berg and Vince Delio
and Laura Iwan and Thomas Hurbanek and Sandoor P.
Schuman and Jagdish Gangolly and Adnan Baykal and Jon
Hobbs",
title = "Innovative model for information assurance curriculum:
{A} teaching hospital",
journal = j-JERIC,
volume = "6",
number = "3",
pages = "2:1--2:??",
month = sep,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1243481.1243483",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:25 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "A novel idea for information security education
created by the New York State Center for Information
Forensics and Assurance (CIFA) is presented. This new
approach incorporates a teaching hospital model
originally developed for medical training. In this
model, information security problems from industry and
government are solved and abstracted into living-cases
used for training and education of university students
and public-sector employees. Such a model helps ensure
that the curriculum stays current even as the field of
information assurance continues to evolve. Solving
industry problems hones research skills, while exposing
students to living cases helps build context for
concepts in information assurance. The success of this
approach is contingent upon strong partnerships with
government and private organizations that have real
security issues as well as an active research program
in information security that involves faculty and
students. This article presents an implementation of
this approach at CIFA. Development of the curriculum,
observations gleaned through dissemination of the
curriculum, and the infrastructure developed to support
this concept are discussed. Evaluation of students has
demonstrated the effectiveness of the ``teaching
hospital'' concept and provided us with feedback to
further refine its implementation.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "case-based learning; cases; constructivism; education;
information assurance; information security education;
learning; problem-based learning; teaching hospital",
}
@Article{Bishop:2006:TCI,
author = "Matt Bishop",
title = "Teaching context in information security",
journal = j-JERIC,
volume = "6",
number = "3",
pages = "3:1--3:??",
month = sep,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1243481.1243484",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:25 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This article investigates teaching the application of
technical ideas by non-technical means, especially by
using puzzles to engage students. After discussing the
need to teach students to evaluate contexts in which
decisions about computer security must be made, we
suggest questions and scenarios drawn from political
science, history, as well as other humanities, to force
students to apply or derive principles of computer
security in unusual and unexpected situations. Our
experience shows that students find the process
enjoyable, stimulating, and effective.",
acknowledgement = ack-nhfb,
articleno = "3",
keywords = "computer security; environment; instruction;
judgment",
}
@Article{Garcia-Pasquel:2006:GCT,
author = "Jes{\'u}s Adolfo Garc{\'\i}a-Pasquel and Jos{\'e}
Galaviz",
title = "{Ganz{\'u}a}: a cryptanalysis tool for
monoalphabetic and polyalphabetic ciphers",
journal = j-JERIC,
volume = "6",
number = "3",
pages = "4:1--4:??",
month = sep,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1243481.1243485",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:25 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Many introductory courses to cryptology and computer
security start with or include a discussion of
classical ciphers that usually contemplates some
cryptanalysis techniques used to break them. Ganz{\'u}a
(picklock in Spanish) is an application designed to
assist the cryptanalysis of ciphertext obtained with
monoalphabetic or polyalphabetic ciphers. It can use
almost arbitrary character sets for the plain and
cipher alphabets as well as obtain the standard
relative frequencies of many languages and provide
other useful data.",
acknowledgement = ack-nhfb,
articleno = "4",
keywords = "classical cryptography; cryptology",
}
@Article{Shumba:2006:THL,
author = "Rose Shumba",
title = "Teaching hands-on {Linux} host computer security",
journal = j-JERIC,
volume = "6",
number = "3",
pages = "5:1--5:??",
month = sep,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1243481.1243486",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:25 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "In the summer of 2003, a project to augment and
improve the teaching of information assurance courses
was started at IUP. Thus far, ten hands-on exercises
have been developed. The exercises described in this
article, and presented in the appendix, are based on
actions required to secure a Linux host. Publicly
available resources were used to develop the exercises,
which have been successfully utilized since spring 2003
to teach cybersecurity basics classes. The experiences
and challenges encountered in teaching the course and
possible future work are also described.",
acknowledgement = ack-nhfb,
articleno = "5",
keywords = "computer security; cryptography; file integrity; file
permissions; host security exercises; user accounts",
}
@Article{Harrison:2006:TPC,
author = "Warren Harrison",
title = "A term project for a course on computer forensics",
journal = j-JERIC,
volume = "6",
number = "3",
pages = "6:1--6:??",
month = sep,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1243481.1243487",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:25 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "The typical approach to creating an examination disk
for exercises and projects in a course on computer
forensics is for the instructor to populate a piece of
media with evidence to be retrieved. While such an
approach supports the simple use of forensic tools, in
many cases the use of an instructor-developed
examination disk avoids utilizing some key aspects of a
digital investigation by overly focusing on the
mechanics of retrieval. We recently developed a course
on computer forensics that utilized a large-scale,
team-based term project involving the forensics
examination of a computer system. In this article we
describe an approach for providing examination disks
for student use in a term project that reinforces the
investigative aspect of the process.",
acknowledgement = ack-nhfb,
articleno = "6",
keywords = "computer crime; computer evidence; student projects",
}
@Article{Frincke:2006:ERC,
author = "D. Frincke and S. Oudekirk and B. Popovsky",
title = "Editorial: {Resources} for the computer security and
information assurance curriculum",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "1:1--1:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248454",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This editorial introduces the articles in this
companion issue to the first JERIC special issue on
Computer Security and Information Assurance Curriculum.
It includes an article that supports making computer
security education more accessible through a portable
network, and one on lessons learned in developing a
workshop for educators. Other articles outline
laboratory exercises especially suitable for distance
or online education, illustrate ways to teach students
about threats, and provide approaches to classroom
discussion of disaster recovery.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "computer forensics; protection; security",
}
@Article{Rosenberg:2006:TNR,
author = "Timothy Rosenberg and Lance J. Hoffman",
title = "Taking the network on the road: {Portable} network
solutions for computer security educators",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "2:1--2:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248455",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Educational institutions that wish to implement a
specialized teaching laboratory often have a variety of
obstacles to overcome. Some of these obstacles are
related to adapting existing classroom infrastructure,
building the laboratory, and meeting the demands for
multiple-use classrooms to maximize the return on
investment. In some cases, such as computer security,
they must also maintain a controlled environment.
Portable educational networks of computers allow
teaching specialized topics that have heretofore
required specialized laboratories in existing
classrooms. Their flexibility allows them to be used
for a variety of content---operating systems,
networking, security, and forensics. These systems are
in use today supporting undergraduate, graduate, and
professional education.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "closed laboratories; computer security; cooperative
learning; information assurance; information security;
instructional design",
}
@Article{Wagner:2006:PCS,
author = "Paul J. Wagner and Andrew T. Phillips",
title = "A portable computer security workshop",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "3:1--3:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248456",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "We have developed a computer security workshop
designed to instruct post-secondary instructors who
want to start a course or laboratory exercise sequence
in computer security. This workshop has also been used
to provide computer security education to IT
professionals and students. It is effective in
communicating basic computer security principles as
well as an understanding of some of the significant
tools and techniques in this area. Evaluations of the
workshop have been very positive; we will offer the
workshop locally, regionally, and nationally in the
next year. The materials from this workshop are
available at
\url{http://clics.cs.uwec.edu/workshopmaterials.htm}.",
acknowledgement = ack-nhfb,
articleno = "3",
keywords = "computer security; laboratory exercises; portable
workshop",
}
@Article{Bhagyavati:2006:LEO,
author = "Bhagyavati",
title = "Laboratory exercises in online information assurance
courses",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "4:1--4:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248457",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Information assurance courses delivered in an online
environment pose challenges to the development of
meaningful hands-on exercises for students. This
article presents techniques on furnishing laboratory
exercises to online students and presents examples of
assignments drawn from the author's experiences in
teaching online courses for over three years. These
assignments have proven successful in enhancing the
learning experiences of undergraduate and graduate
computer science students in introductory and advanced
courses in the area of information assurance. Typical
courses include introduction to computer networks,
computer and network security, information assurance,
network management, wireless networks and applications,
computer forensics, and risk assessment.",
acknowledgement = ack-nhfb,
articleno = "4",
keywords = "blended courses; hands-on; information assurance;
infrastructure safeguards; network security; online
learning",
}
@Article{Brustoloni:2006:LEN,
author = "Jos{\'e} Carlos Brustoloni",
title = "Laboratory experiments for network security
instruction",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "5:1--5:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248458",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "We describe a sequence of five experiments on network
security that cast students successively in the roles
of computer user, programmer, and system administrator.
Unlike experiments described in several previous
papers, these experiments avoid placing students in the
role of attacker. Each experiment starts with an
in-class demonstration of an attack by the instructor.
Students then learn how to use open-source defense
tools appropriate for the role they are playing and the
attack at hand. Threats covered include eavesdropping,
dictionary, man-in-the-middle, port scanning, and
fingerprinting attacks. Defense skills gained by
students include how to forward ports with OpenSSH, how
to prevent weak passwords with CrackLib, how to salt
passwords, how to set up a simple certifying authority,
issue and verify certificates, and guarantee
communication confidentiality and integrity using
OpenSSL, and how to set up firewalls and IPsec-based
virtual private networks. At two separate offerings,
tests taken before and after each experiment showed
that each has a statistically significant and large
effect on students' learning. Moreover, surveys show
that students finish the sequence of experiments with
high interest in further studies and work in the area
of security. These results suggest that the experiments
are well-suited for introductory security or networking
courses.",
acknowledgement = ack-nhfb,
articleno = "5",
keywords = "certificate; certifying authority; course; dictionary
attack; eavesdropping; education; experiment;
fingerprinting; firewall; IPsec; man-in-the-middle;
password; port scanning; security; SSH; SSL; VPN",
}
@Article{Landry:2006:DCD,
author = "Brett J. L. Landry and M. Scott Koger",
title = "Dispelling 10 common disaster recovery myths:
{Lessons} learned from {Hurricane Katrina} and other
disasters",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "6:1--6:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248459",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Disasters happen all the time; yet despite this, many
organizations are caught unprepared or make unrealistic
assumptions. These factors create environments that
will fail during a disaster. Most information
technology (IT) curricula do not cover disaster
recovery (DR) plans and strategies in depth. The
unfortunate result is that most new computer systems
are implemented without sufficient disaster recovery
plans and testing. Courses on network security need to
examine DR as a real threat and cover it as a core
module. By dispelling the 10 common myths,
organizations can better plan, develop, and test true
DR plans.",
acknowledgement = ack-nhfb,
articleno = "6",
keywords = "backups; business continuity; disaster recovery;
hardware failures; IT curricula; network attacks;
software failures; viruses; worms",
}
@Article{McCartney:2007:ENV,
author = "Robert McCartney and Josh Tenenberg",
title = "From the editors: a new vision for {JERIC}",
journal = j-JERIC,
volume = "7",
number = "1",
pages = "1:1--1:??",
month = mar,
year = "2007",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:45 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "As the new Editors-in-Chief, we outline our vision for
building JERIC to become the premier journal in
computing education. Doing so will require authors who
submit high-quality articles --- their ``best stuff'',
reviewers who provide the feedback and guidance to
ensure that each article embodies a scholarly approach
to teaching and learning while being of practical use
to the computing educator, and readers who read the
articles, critically evaluate and discuss the findings
with others, and adapt, adopt, and evaluate these
findings in their own classrooms.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "manuscript review criteria; scholarship of teaching
and learning",
}
@Article{Coelho:2007:CSD,
author = "Wesley Coelho and Gail Murphy",
title = "{ClassCompass}: a software design mentoring system",
journal = j-JERIC,
volume = "7",
number = "1",
pages = "2:1--2:??",
month = mar,
year = "2007",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:45 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Becoming a quality software developer requires
practice under the guidance of an expert mentor.
Unfortunately, in most academic environments, there are
not enough experts to provide any significant design
mentoring for software engineering students. To address
this problem, we present a collaborative software
design tool intended to maximize an instructor's
ability to mentor a group of students. Students use the
system to create software designs for a given set of
requirements. While they work, students receive
automated feedback regarding common design mistakes.
The system then provides support and guidance for
students to manually critique each other's work.
Students can view and learn from the design approaches
taken by other students, as well as the critiques
associated with them. We have tried this approach in
software engineering classes with some positive
results. We believe that this collaborative and
partially automated approach can significantly improve
the quality of software design education when few
mentors are available.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "collaborative education; design critiquing",
}
@Article{Hendry:2007:HPC,
author = "David G. Hendry",
title = "History places: a case study for relational database
and information retrieval system design",
journal = j-JERIC,
volume = "7",
number = "1",
pages = "3:1--3:??",
month = mar,
year = "2007",
CODEN = "????",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:45 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This article presents a project-based case study that
was developed for students with diverse backgrounds and
varied inclinations for engaging technical topics. The
project, called History Places, requires that student
teams develop a vision for a kind of digital library,
propose a conceptual model, and use the model to derive
a logical model and information retrieval
specification. From these two design representations,
students implement a data-driven Web site that enables
users to browse content and search by exact and
best-match queries. The project brief contains a set of
general requirements that promote creative solutions,
while also bounding the complexity of the solution
space. The article includes teaching notes and a
conceptual model, expressed as an enhanced
entity-relationship model in UML. The model, consisting
of approximately ten entities, contains binary, unary,
ternary, and specialization/generalization
relationships. The article concludes with some
reflections based on the experiences of using this
project in six classes over four years.",
acknowledgement = ack-nhfb,
articleno = "3",
keywords = "case-based learning; conceptual modeling; database
management systems; design; education; informatics;
information retrieval; Lucene; PostgreSQL; UML",
}
@Article{Tenenberg:2007:CSL,
author = "Josh Tenenberg and Robert McCartney",
title = "Computer science in a liberal arts context",
journal = j-JERIC,
volume = "7",
number = "2",
pages = "1:1--1:??",
month = jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1240200.1240201",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:52 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This issue is devoted to the curriculum guidelines
from the Liberal Arts Computer Science Consortium.
These guidelines provide a coherent and important model
for computing education within a liberal arts context,
giving primacy to critical reason, rigorous methods,
and student engagement in the research process. In this
regard, they are at the same time both conservative, by
giving low priority to the latest technologies, and
radical by resisting the managerial impulse that at its
worst commodifies and devalues higher education.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "computing curriculum guidelines; LACS; liberal arts",
}
@Article{Consortium:2007:MCL,
author = "Liberal Arts Computer Science Consortium",
title = "A 2007 model curriculum for a liberal arts degree in
computer science",
journal = j-JERIC,
volume = "7",
number = "2",
pages = "2:1--2:??",
month = jun,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1240200.1240202",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:52 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "computing curriculum guidelines; LACS; liberal arts",
}
@Article{McCartney:2007:WE,
author = "Robert McCartney and Josh Tenenberg",
title = "Why Evidence?",
journal = j-JERIC,
volume = "7",
number = "3",
pages = "1:1--1:??",
month = nov,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1281320.1281321",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:56 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "A goal of JERIC is to support educational practice by
publishing articles that are useful to classroom
instructors. One way of ensuring this utility is to
require that claims are backed up by evidence. This
evidence allows the reader to evaluate the potential
effectiveness and transferability of any approaches
presented in these articles to their own courses and
situations.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "evidence-based education",
}
@Article{Greitzer:2007:CSI,
author = "Frank L. Greitzer and Olga Anna Kuchar and Kristy
Huston",
title = "Cognitive science implications for enhancing training
effectiveness in a serious gaming context",
journal = j-JERIC,
volume = "7",
number = "3",
pages = "2:1--2:??",
month = nov,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1281320.1281322",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:56 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Serious games use entertainment principles,
creativity, and technology to meet government or
corporate training objectives, but these principles
alone will not guarantee that the intended learning
will occur. To be effective, serious games must
incorporate sound cognitive, learning, and pedagogical
principles into their design and structure. In this
paper, we review cognitive principles that can be
applied to improve the training effectiveness in
serious games and we describe a process we used to
design improvements for an existing game-based training
application in the domain of cyber security
education.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "cognitive principles; computer-based training; cyber
security education; serious gaming; training
effectiveness",
}
@Article{Tenenberg:2008:LQE,
author = "Josh Tenenberg and Robert McCartney",
title = "Linking questions and evidence",
journal = j-JERIC,
volume = "7",
number = "4",
pages = "1:1--1:??",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1316450.1316451",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:59 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This special issue features a set of papers recently
published in the 3rd International Workshop on
Computing Education Research (ICER'07). The papers were
selected because they closely meet the publication
criteria for ACM/JERIC: stemming from computing
education practice, grounded in relevant literature,
containing analysis of primary empirical data collected
to support specific claims, and providing implications
for practice. In addition, the diverse set of research
methods used demonstrates how empirical methods can be
chosen to serve the specific questions of interest,
whether for purposes of research or for improvement of
teaching practice. This set of papers can therefore
serve as exemplars and resources for the educator
wishing to develop a wider range of tools for probing
issues of teaching and learning within the classroom.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "empirical methods; evidence; quasi-experiment;
research methods",
}
@Article{Hanks:2008:PEN,
author = "Brian Hanks",
title = "Problems encountered by novice pair programmers",
journal = j-JERIC,
volume = "7",
number = "4",
pages = "2:1--2:??",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1316450.1316451",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:59 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "In a study of the types of problems encountered by
students that led them to seek assistance, Robins et
al. [2006] found that the most common problems were
related to trivial mechanics. The students in this
study worked by themselves on their programming
exercises. This article discusses a replication of the
Robins et al. study in which the subjects pair
programmed. The types of problems encountered by the
pairing students were similar to those of the solo
students. The number of problems requiring assistance
was much smaller for the pairing students, which
suggests that they were able to resolve more problems
on their own.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "computer science education; CS1; errors; novice; pair
programming",
}
@Article{Sajaniemi:2008:SDS,
author = "Jorma Sajaniemi and Marja Kuittinen and Taina
Tikansalo",
title = "A study of the development of students' visualizations
of program state during an elementary object-oriented
programming course",
journal = j-JERIC,
volume = "7",
number = "4",
pages = "3:1--3:??",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1316450.1316453",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:59 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Students' understanding of object-oriented (OO)
program execution was studied by asking students to
draw a picture of a program state at a specific moment.
Students were given minimal instructions on what to
include in their drawings in order to see what they
considered to be central concepts and relationships in
program execution. Three drawing tasks were given at
different phases of an elementary OO programming course
where two animation tools were used for program
visualization. The drawings were analyzed for their
overall approaches and their detailed
contents.\par
There was a large variability in the overall approaches
and the popularity of various approaches changed during
the course. The results indicate that students' mental
representations of OO concepts and program execution
not only grow as new material is covered in teaching,
but they also change. The first drawings treat methods
as having primarily a static existence; later methods
are seen as dynamic invocations that call each other.
The role of classes in program execution fluctuates
during learning, indicating problems in locating the
notion of class with respect to, for example, objects.
Two major sources of problems that manifested in many
different forms were the relationship between object
and method, and the role of the main method with
respect to program state. Other problems were caused by
overly simplistic understanding of object
identification and improper use of application domain
knowledge.",
acknowledgement = ack-nhfb,
articleno = "3",
keywords = "CS1/2; mental representation; object-oriented
programming; program state; visualization",
}
@Article{Chinn:2008:USV,
author = "Donald Chinn and Tammy Vandegrift",
title = "Uncovering student values for hiring in the software
industry",
journal = j-JERIC,
volume = "7",
number = "4",
pages = "4:1--4:??",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1316450.1316454",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:59 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "This article provides an analysis of student responses
to an exercise used in a computer ethics and a software
engineering course to raise awareness of issues related
to hiring, including issues of professional
responsibility and diversity. Students from two
different universities were asked to evaluate four
candidates for two positions in a fictitious software
company. They then developed a set of criteria for
evaluation and constructed an argument to support their
choices. After discussing their choice with others in
the class, students could change their hiring
decisions. Students' hiring criteria were coded using
emergent categories, inferences in the arguments were
coded according to the criteria, and reasons for
changing hiring decisions were coded. Students
considered criteria that fell into five areas:
technical skills, soft skills, personal traits,
previous employment, and career/job considerations.
Reasons for changing hiring choices included previous
experience, diversity considerations, people skills,
leadership skills, and reaching consensus. The article
also reports inferences students made about the job
candidates.",
acknowledgement = ack-nhfb,
articleno = "4",
keywords = "diversity; ethics; hiring criteria",
}
@Article{Simon:2008:FYS,
author = "Beth Simon and Brian Hanks",
title = "First-year students' impressions of pair programming
in {CS1}",
journal = j-JERIC,
volume = "7",
number = "4",
pages = "5:1--5:??",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1316450.1316455",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:59 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Pair programming, as part of the Agile Development
process, has noted benefits in professional software
development scenarios. These successes have led to a
rise in use of pair programming in educational
settings, particularly in Computer Science 1 (CS1).
Specifically, McDowell et al. [2006] has shown that
students using pair programming in CS1 do better in a
CS2 class (with solo programming) than students who
don't pair in CS1. This paper seeks to address a
similar question, but from a qualitative,
student-focused approach. How do students define,
experience, and value the pair programming experience?
How do they experience and value it compared to solo
programming? Does pairing in CS1 impact their
confidence in their abilities?\par
We report on semi-structured interviews with 11
subjects from two institutions where pair programming
was used in CS1, and solo programming was used in the
CS2. Many of the responses met our expectations;
students get stuck less and explore more ideas while
pairing, and believe that pair programming helped them
in CS1. Other responses were more surprising. Students
reported that when solo programming they were more
confident and understood their programs better. Many
students also said that they started work on their
assignments earlier when soloing. Students also
continue to use other students as resources even when
working 'solo.'",
acknowledgement = ack-nhfb,
articleno = "5",
keywords = "CS1; debugging; interview; novice; pair programming;
qualitative",
}
@Article{Yarosh:2008:NDS,
author = "Svetlana Yarosh and Mark Guzdial",
title = "Narrating data structures: {The} role of context in
{CS2}",
journal = j-JERIC,
volume = "7",
number = "4",
pages = "6:1--6:??",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1316450.1316456",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:59 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Learning computing with respect to the context of its
use has been linked in previous reports to student
motivation in introductory Computer Science (CS)
courses. In this report, we consider the role of
context in a second course. We present a case study of
a CS2 data structures class that uses a media
computation context. In this course, students learn
data structures and object-oriented (OO) programming
through a pervasive narrative about how real media
professionals use data structures to model the real
world and to construct the digital images, sounds, and
animations with which the students are familiar in
their daily lives. We found that context played a
different role in a second course than in a first
course. We found evidence that some students did not
need context to appreciate computing, but we also found
evidence that context can help students get engaged
with the material that they otherwise do not find
interesting. In particular, the narrative aspect of a
context may help students in relating the elements of
the course and may even help with learning.",
acknowledgement = ack-nhfb,
articleno = "6",
keywords = "course design; CS1/2; media computation",
}
@Article{McCartney:2008:CJ,
author = "Robert McCartney and Josh Tenenberg",
title = "From Conference to Journal",
journal = j-JERIC,
volume = "8",
number = "1",
pages = "1:1--1:??",
month = mar,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1348713.1348714",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:13:08 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Revising and extending conference articles for journal
publication benefits both authors and readers. The new
articles are more complete, and benefit from peer
review, feedback from conference presentation, and
greater editorial consistency. For those articles that
are appropriate, we encourage authors to do this, and
present two examples of such articles in this issue.",
acknowledgement = ack-nhfb,
articleno = "1",
keywords = "conference; journal; publication",
}
@Article{Gestwicki:2008:TDP,
author = "Paul Gestwicki and Fu-Shing Sun",
title = "Teaching Design Patterns Through Computer Game
Development",
journal = j-JERIC,
volume = "8",
number = "1",
pages = "2:1--2:??",
month = mar,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1348713.1348715",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:13:08 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "We present an approach for teaching design patterns
that emphasizes object-orientation and patterns
integration. The context of computer game development
is used to engage and motivate students, and it is
additionally rich with design patterns. A case study is
presented based on EEClone, an arcade-style computer
game implemented in Java. Our students analyzed various
design patterns within EEClone, and from this
experience, learned how to apply design patterns in
their own game software. The six principal patterns of
EEClone are described in detail, followed by a
description of our teaching methodology, assessment
techniques, and results.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "assessment; design patterns; games in education; UML",
}
@Article{Du:2008:SSI,
author = "Wenliang Du and Ronghua Wang",
title = "{SEED}: a Suite of Instructional Laboratories for
Computer Security Education",
journal = j-JERIC,
volume = "8",
number = "1",
pages = "3:1--3:??",
month = mar,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1348713.1348716",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:13:08 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "The security and assurance of our computing
infrastructure has become a national priority. To
address this priority, higher education has gradually
incorporated the principles of computer and information
security into the mainstream undergraduate and graduate
computer science curricula. To achieve effective
education, learning security principles must be
grounded in experience. This calls for effective
laboratory exercises (or course projects). Although a
number of laboratories have been designed for security
education, they only cover a small portion of the
fundamental security principles. Moreover, their
underlying lab environments are different, making
integration of these laboratories infeasible for a
semester-long course. Currently, security laboratories
that can be widely adopted are still lacking, and they
are in great demand in security education.\par
We have developed a novel laboratory environment
(referred to as SEED). The SEED environment consists of
Minix, an instructional operating system (OS), and
Linux, a production OS; it takes advantage of the
simplicity of Minix and the completeness of Linux, and
provides a unified platform to support a rich set of
laboratories for computer security education. Based on
the SEED environment, we have developed a list of
laboratories that cover a wide spectrum of security
principles. These labs provide opportunities for
students to develop essential skills for secure
computing practice. We have been using these labs in
our courses during the last five years. This article
presents our SEED environment, laboratories, and
evaluation results.",
acknowledgement = ack-nhfb,
articleno = "3",
keywords = "education; instructional laboratories; security",
}
@Article{Tenenberg:2008:GST,
author = "Josh Tenenberg and Robert McCartney",
title = "Grounding the Scholarship of Teaching and Learning in
Practice",
journal = j-JERIC,
volume = "8",
number = "2",
pages = "4:1--4:??",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1362787.1362788",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:13:14 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "We invite submissions to ACM/JERIC from teaching
practitioners who are our readers. Grounding these
submissions in the lived practice of teaching; using
data that is already collected to assess student
learning; and reporting the data collection, analysis,
and context of use accurately and honestly are key
aspects for taking a scholarly approach to teaching and
learning. We hope to see more such scholarly inquiries
by computing educators in the pages of future issues.",
acknowledgement = ack-nhfb,
articleno = "4",
keywords = "practitioner knowledge; scholarship of teaching and
learning",
}
@Article{Sakhnini:2008:RAH,
author = "Victoria Sakhnini and Orit Hazzan",
title = "Reducing Abstraction in High School Computer Science
Education: {The} Case of Definition, Implementation,
and Use of Abstract Data Types",
journal = j-JERIC,
volume = "8",
number = "2",
pages = "5:1--5:??",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1362787.1362789",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:13:14 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "The research presented in this article deals with the
difficulties and mental processes involved in the
definition, implementation, and use of abstract data
types encountered by 12$^{th}$ grade advanced-level
computer science students. Research findings are
interpreted within the theoretical framework of
reducing abstraction [Hazzan 1999]. The article
describes the research setting and findings and
concludes with some pedagogical implementations.",
acknowledgement = ack-nhfb,
articleno = "5",
keywords = "abstract data types; abstraction; computer science
education; problem solving; reducing abstraction",
}
@Article{Zendler:2008:EFC,
author = "Andreas Zendler and Christian Spannagel",
title = "Empirical Foundation of Central Concepts for Computer
Science Education",
journal = j-JERIC,
volume = "8",
number = "2",
pages = "6:1--6:??",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1362787.1362790",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:13:14 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "The design of computer science curricula should rely
on central concepts of the discipline rather than on
technical short-term developments. Several authors have
proposed lists of basic concepts or fundamental ideas
in the past. However, these catalogs were based on
subjective decisions without any empirical support.
This article describes the empirical determination of
central concepts for computer science education.
Experts of computer science rated 49 concepts regarding
four criteria. The cluster analysis of the data
revealed the following central concepts: problem, data,
computer, test, algorithm, process, system,
information, language, communication, software,
program, computation, structure, and model.",
acknowledgement = ack-nhfb,
articleno = "6",
keywords = "central concepts; fundamental ideas",
}
@Article{McCartney:2008:MIR,
author = "Robert McCartney and Josh Tenenberg",
title = "Making it Real",
journal = j-JERIC,
volume = "8",
number = "3",
pages = "7:1--7:??",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1404935.1404936",
ISSN = "1531-4278",
bibdate = "Fri Oct 10 12:52:01 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Some have proposed that realistic problem situations
are better for earning. This issue contains two
articles that examine the effects of ``making it real''
in computer architecture and human-computer
interaction.",
acknowledgement = ack-nhfb,
articleno = "7",
keywords = "context; realism",
}
@Article{Tew:2008:CSL,
author = "Allison Elliott Tew and Brian Dorn and William D.
{Leahy, Jr.} and Mark Guzdial",
title = "Context as Support for Learning Computer
Organization",
journal = j-JERIC,
volume = "8",
number = "3",
pages = "8:1--8:??",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1404935.1404937",
ISSN = "1531-4278",
bibdate = "Fri Oct 10 12:52:01 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "The ubiquity of personal computational devices in the
lives of today's students presents a meaningful context
for courses in computer organization beyond the
general-purpose or imaginary processors routinely used.
This article presents results of a comparative study
examining student performance in a conventional
organization course and in one that has been
contextualized using a personal gaming platform as the
pedagogical architecture. We find minimal differences
in student learning but significant motivation and
engagement gains for those in the contextualized
course.",
acknowledgement = ack-nhfb,
articleno = "8",
keywords = "computer organization; context; course design",
}
@Article{Yardi:2008:HAC,
author = "Sarita Yardi and Pamela Krolikowski and Taneshia
Marshall and Amy Bruckman",
title = "An {HCI} Approach to Computing in the Real World",
journal = j-JERIC,
volume = "8",
number = "3",
pages = "9:1--9:??",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1404935.1404938",
ISSN = "1531-4278",
bibdate = "Fri Oct 10 12:52:01 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "We describe the implementation of a six-week course to
teach Human-Computer Interaction (HCI) to high school
students. Our goal was to explore the potential of HCI
in motivating students to pursue future studies in
related computing fields. Participants in our course
learned to make connections between the types of
technology they use in their daily lives and the design
processes that went into creating these technologies.
We suggest that by portraying computing through the
lens of HCI, as an innovative, creative, and
challenging field with authentic, real-world
applications, we may be able to motivate students to
become more interested in computing.",
acknowledgement = ack-nhfb,
articleno = "9",
keywords = "broadening participation in computing; education;
human-computer interaction; K-12 curriculum;
motivation",
}
@Article{Tenenberg:2009:APS,
author = "Josh Tenenberg and Robert McCartney",
title = "Answering Part of the Significant Question",
journal = j-JERIC,
volume = "8",
number = "4",
pages = "10:1--10:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1482348.1482349",
ISSN = "1531-4278",
bibdate = "Mon Feb 2 16:27:27 MST 2009",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Most scientific articles address particular questions
which are part of larger questions. The part-whole
relationship varies.",
acknowledgement = ack-nhfb,
articleno = "10",
keywords = "Extension; prerequisite",
}
@Article{Armoni:2009:RCM,
author = "Michal Armoni",
title = "Reduction in {CS}: a (Mostly) Quantitative Analysis
of Reductive Solutions to Algorithmic Problems",
journal = j-JERIC,
volume = "8",
number = "4",
pages = "11:1--11:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1482348.1482350",
ISSN = "1531-4278",
bibdate = "Mon Feb 2 16:27:27 MST 2009",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Reduction is a problem-solving strategy, relevant to
various areas of computer science, and strongly
connected to abstraction: a reductive solution
necessitates establishing a connection among problems
that may seem totally disconnected at first sight, and
abstracts the solution to the reduced-to problem by
encapsulating it as a black box. The study described in
this article continues a previous, qualitative study
that examined the ways undergraduate computer science
students perceive, experience, and use reduction as a
problem-solving strategy. The current study examines
the same issue, but in the context of a larger
population, using also quantitative analysis, and
focusing on algorithmic problems. The findings indicate
difficulties students have with the abstract
characteristics of reduction and with acknowledging
reduction as a general problem-solving strategy.",
acknowledgement = ack-nhfb,
articleno = "11",
keywords = "black box; Reduction; reductive thinking",
}
@Article{Jayal:2009:PLA,
author = "Ambikesh Jayal and Martin Shepperd",
title = "The Problem of Labels in {E}-Assessment of Diagrams",
journal = j-JERIC,
volume = "8",
number = "4",
pages = "12:1--12:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1482348.1482351",
ISSN = "1531-4278",
bibdate = "Mon Feb 2 16:27:27 MST 2009",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "In this article we explore a problematic aspect of
automated assessment of diagrams. Diagrams have partial
and sometimes inconsistent semantics. Typically much of
the meaning of a diagram resides in the labels;
however, the choice of labeling is largely
unrestricted. This means a correct solution may utilize
differing yet semantically equivalent labels to the
specimen solution. With human marking this problem can
be easily overcome. Unfortunately with e-assessment
this is challenging. We empirically explore the scale
of the problem of synonyms by analyzing 160 student
solutions to a UML task. From this we find that
cumulative growth of synonyms only shows a limited
tendency to reduce at the margin despite using a range
of text processing algorithms such as stemming and
auto-correction of spelling errors. This finding has
significant implications for the ease in which we may
develop future e-assessment systems of diagrams, in
that the need for better algorithms for assessing label
semantic similarity becomes inescapable.",
acknowledgement = ack-nhfb,
articleno = "12",
keywords = "diagrams; E-assessment",
}