Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.14",
%%%     date            = "14 October 2017",
%%%     time            = "08:50:10 MDT",
%%%     filename        = "jeric.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "42919 3290 14268 139411",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; ACM Journal on
%%%                        Educational Resources in Computing (JERIC)",
%%%     license         = "public domain",
%%%     supported       = "no",
%%%     docstring       = "This is a COMPLETE BibTeX bibliography for
%%%                        the electronic journal ACM Journal on
%%%                        Educational Resources in Computing (JERIC)
%%%                        (CODEN unknown, ISSN 1531-4278), for
%%%                        2001--date.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        March 2001.  The journal appeared quarterly
%%%                        in volumes 1 and 2, and bimonthly since then.
%%%                        Publication ceased in 2009 with volume 8,
%%%                        number 4.  The journal now appears under a
%%%                        new name, ACM Transactions on Computing
%%%                        Education (TOCE), which is covered in a
%%%                        companion bibliography file, toce.bib.
%%%
%%%                        The journal has a World-Wide Web site at:
%%%
%%%                            http://www.acm.org/pubs/jeric
%%%                            http://portal.acm.org/browse_dl.cfm?idx=J814
%%%
%%%                        Tables-of-contents of all issues are
%%%                        available at:
%%%
%%%                            http://www.acm.org/pubs/contents/journals/jeric/
%%%
%%%                        Qualified subscribers can retrieve the full
%%%                        text of recent articles in PDF form.
%%%
%%%                        At version 1.14, the COMPLETE journal
%%%                        coverage looked like this:
%%%
%%%                             2001 (  23)    2004 (  10)    2007 (   7)
%%%                             2002 (  17)    2005 (  24)    2008 (  15)
%%%                             2003 (   8)    2006 (  17)    2009 (   3)
%%%
%%%                             Article:        124
%%%
%%%                             Total entries:  124
%%%
%%%                        Data for this bibliography was derived from
%%%                        data at the ACM Web site.
%%%
%%%                        ACM copyrights explicitly permit abstracting
%%%                        with credit, so article abstracts, keywords,
%%%                        and subject classifications have been
%%%                        included in this bibliography wherever
%%%                        available.
%%%
%%%                        The bibsource keys in the bibliography
%%%                        entries below indicate the data sources.
%%%
%%%                        URL keys in the bibliography point to
%%%                        World Wide Web locations of additional
%%%                        information about the entry.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the
%%%                        companion file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume.''
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{"\input bibnames.sty"
    # "\ifx \undefined \circled \def \circled #1{(#1)}\fi"
    # "\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-JERIC                 = "ACM Journal on Educational Resources in
                                  Computing (JERIC)"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Burger:2001:FST,
  author =       "C. Burger and K. Rothermel",
  title =        "A framework to support teaching in distributed
                 systems",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "3",
}

@Article{Cassel:2001:EIA,
  author =       "Lillian N. Cassel and Edward A. Fox",
  title =        "Editorial: introducing the {ACM Journal on Resources
                 in Computing}",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
}

@Article{Fischer:2001:CES,
  author =       "Stephan Fischer",
  title =        "Course and exercise sequencing using metadata in
                 adaptive hypermedia learning systems",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "5",
}

@Article{Heller:2001:GGE,
  author =       "R. S. Heller",
  title =        "Greetings from the {Guest Editor}",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "2",
}

@Article{Heller:2001:UTM,
  author =       "Rachelle S. Heller and C. Dianne Martin and Nuzi
                 Haneef and Sonja Gievska-Krliu",
  title =        "Using a theoretical multimedia taxonomy framework",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "6",
}

@Article{Leidig:2001:LTO,
  author =       "Torsten Leidig",
  title =        "{L3}{---}towards an open learning environment",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "7",
}

@Article{Maly:2001:IHJ,
  author =       "R. Maly and H. Abdel-Wahab and C. Wild and C. M.
                 Overstreet and A. Gupta and A. Abdel-Hamid and S.
                 Ghanem and A. Gonzalez and X. Zhu",
  title =        "{IRI-h}, a {Java-based} distance education system:
                 architecture and performance",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "8",
}

@Article{Saddik:2001:RAI,
  author =       "Abdulmotaleb El Saddik and Stephan Fischer and Ralf
                 Steinmetz",
  title =        "Reusability and adaptability of interactive resources
                 in {Web-based} educational systems",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "4",
}

@Article{Shirmohammadi:2001:WBM,
  author =       "Shervin Shirmohammadi and Abdulmotaleb El Saddik and
                 Nicolas D. Georganas and Ralf Steinmetz",
  title =        "{Web}-based multimedia tools for sharing educational
                 resources",
  journal =      j-JERIC,
  volume =       "1",
  number =       "1es",
  pages =        "??--??",
  month =        mar,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "9",
}

@Article{Balci:2001:AAL,
  author =       "Osman Balci and William S. Gilley and Robin J. Adams
                 and Emre Tunar and N. Dwight Barnette",
  title =        "Animations to Assist Learning Some Key Computer
                 Science Topics",
  journal =      j-JERIC,
  volume =       "1",
  number =       "2es",
  pages =        "??--??",
  month =        "Summer",
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "5",
}

@Article{Ben-Ari:2001:IED,
  author =       "Mordechai Ben-Ari",
  title =        "Interactive execution of distributed algorithms",
  journal =      j-JERIC,
  volume =       "1",
  number =       "2es",
  pages =        "??--??",
  month =        "Summer",
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "2",
}

@Article{Anido-Rifon:2001:SSI,
  author =       "L. Anido-Rif{\'o}n and M. J. Fern{\'a}ndez-Iglesias
                 and M. Llamas-Nistal and M. Caeiro-Rodr{\'\i}guez and
                 J. Santos-Gago and J. S. Rodr{\'\i}guez-Est{\'e}vez",
  title =        "A component model for standardized {Web}-based
                 education",
  journal =      j-JERIC,
  volume =       "1",
  number =       "2es",
  pages =        "??--??",
  month =        "Summer",
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
}

@Article{Hampel:2001:SSI,
  author =       "Thorsten Hampel and Reinhard Keil-Slawik",
  title =        "{sTeam}: structuring information in team-distributed
                 knowledge management in cooperative learning
                 environments",
  journal =      j-JERIC,
  volume =       "1",
  number =       "2es",
  pages =        "??--??",
  month =        "Summer",
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "3",
}

@Article{Shang:2001:IDE,
  author =       "Yi Shang and Hongchi Shi and Su-Shing Chen",
  title =        "An intelligent distributed environment for active
                 learning",
  journal =      j-JERIC,
  volume =       "1",
  number =       "2es",
  pages =        "??--??",
  month =        "Summer",
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "4",
}

@Article{JTFCC:2001:CC,
  author =       "{The Joint Task Force on Computing Curricula}",
  title =        "Computing curricula 2001",
  journal =      j-JERIC,
  volume =       "1",
  number =       "3es",
  pages =        "??--??",
  month =        "Fall",
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:36 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
}

@Article{Yurcik:2001:E,
  author =       "William Yurcik",
  title =        "Editorial",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "1--3",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Decker:2001:PMS,
  author =       "Rick Decker and Stuart Hirshfield",
  title =        "The {PIPPIN} machine: simulations of language
                 processing",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "4--17",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Menczer:2001:OTR,
  author =       "Filippo Menczer and Alberto Maria Segre",
  title =        "{OAMulator}: a teaching resource to introduce computer
                 architecture concepts",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "18--30",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Braught:2001:KSC,
  author =       "Grant Braught and David Reed",
  title =        "The knob \& switch computer: a computer architecture
                 simulator for introductory computer science",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "31--45",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Skrien:2001:CST,
  author =       "Dale Skrien",
  title =        "{CPU Sim 3.1}: a tool for simulating computer
                 architectures for computer organization classes",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "46--59",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "http://www.cs.colby.edu/djskrien/CPUSim",
  lastaccessed = "17 November 2012",
  acknowledgement = ack-nhfb,
}

@Article{Yehezkel:2001:TST,
  author =       "Cecile Yehezkel and William Yurcik and Murray Pearson
                 and Dean Armstrong",
  title =        "Three simulator tools for teaching computer
                 architecture: {Little Man} computer, and {RTLSim}",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "60--80",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Osborne:2001:PC,
  author =       "Hugh Osborne",
  title =        "The {Postroom Computer}",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "81--110",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wainer:2001:UAS,
  author =       "Gabriel A. Wainer and Sergio Daicz and Luis F. De
                 Simoni and Demian Wassermann",
  title =        "Using the {Alfa-1} simulated processor for educational
                 purposes",
  journal =      j-JERIC,
  volume =       "1",
  number =       "4",
  pages =        "111--151",
  month =        dec,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Yurcik:2002:SIS,
  author =       "William (Bill) Yurcik",
  title =        "Special issue on {\em specialized\/} computer
                 architecture simulators that see the present and may
                 hold the future",
  journal =      j-JERIC,
  volume =       "2",
  number =       "1",
  pages =        "1--3",
  month =        mar,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Burch:2002:LGS,
  author =       "Carl Burch",
  title =        "{Logisim}: a graphical system for logic circuit design
                 and simulation",
  journal =      j-JERIC,
  volume =       "2",
  number =       "1",
  pages =        "5--16",
  month =        mar,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shelburne:2002:PEP,
  author =       "Brian J. Shelburne",
  title =        "A {PDP-8} emulator program",
  journal =      j-JERIC,
  volume =       "2",
  number =       "1",
  pages =        "17--47",
  month =        mar,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/545197.545200",
  ISSN =         "1531-4278",
  bibdate =      "Thu Aug 07 17:10:23 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "The clean, simple, and elegant architecture of the
                 classic PDP-8 makes it an ideal candidate for studying
                 concepts in computer organization. The PDP-8 emulator
                 program allows a user to write, edit, assemble, debug,
                 trace, and execute PDP-8 machine code and PDP-8
                 assembler language programs. With it, the user can
                 obtain a feel for the PDP-8. The PDP-8 emulator program
                 includes a simple built-in text editor which is used to
                 write and edit PDP-8 assembler language programs, an
                 assembler to translate these programs into PDP-8
                 machine code, and a virtual PDP-8 engine upon which to
                 execute the code. PDP-8 code can be executed from a
                 debug screen display that allows the user to observe
                 the contents of registers and memory as the code
                 executes or code can be executed using an I/O interface
                 that requires user-written PDP-8 I/O routines. This
                 article provides an introduction to both the PDP-8
                 architecture and PDP-8 assembler language and discusses
                 how to use the PDP-8 emulator program. The PDP-8
                 emulator program runs under MS-DOS in a command
                 window.",
  acknowledgement = ack-nhfb,
  keywords =     "virtual machine",
}

@Article{Dugan:2002:SIS,
  author =       "B. Dugan and J. Zahorjan",
  title =        "The {Sloop ISA} and the {SMOK} toolkit",
  journal =      j-JERIC,
  volume =       "2",
  number =       "1",
  pages =        "49--71",
  month =        mar,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Moure:2002:KS,
  author =       "J. C. Moure and Dolores I. Rexachs and Emilio Luque",
  title =        "The {KScalar} simulator",
  journal =      j-JERIC,
  volume =       "2",
  number =       "1",
  pages =        "73--116",
  month =        mar,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Roblitz:2002:LSE,
  author =       "Thomas R{\"o}blitz and Frank Mueller and Oliver
                 B{\"u}hn",
  title =        "{LegoSim}: simulation of embedded kernels over
                 {Pthreads}",
  journal =      j-JERIC,
  volume =       "2",
  number =       "1",
  pages =        "117--130",
  month =        mar,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hoganson:2002:HPC,
  author =       "Kenneth E. Hoganson",
  title =        "High-performance computer architecture and algorithm
                 simulator",
  journal =      j-JERIC,
  volume =       "2",
  number =       "1",
  pages =        "131--148",
  month =        mar,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brady:2002:JPB,
  author =       "Alyce Brady and R. C. McDowell and Kelly Schultz",
  title =        "{JavaScript} programming basics: a laboratory series
                 for beginning programmers",
  journal =      j-JERIC,
  volume =       "2",
  number =       "2",
  pages =        "1--1",
  month =        jun,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Carlisle:2002:RI,
  author =       "Martin C. Carlisle and Keith Shomper",
  title =        "{ROBOT} interpreter",
  journal =      j-JERIC,
  volume =       "2",
  number =       "2",
  pages =        "2--2",
  month =        jun,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fagin:2002:AMU,
  author =       "Barry Fagin",
  title =        "{Ada\slash Mindstorms 2.0} user's guide and reference
                 manual",
  journal =      j-JERIC,
  volume =       "2",
  number =       "2",
  pages =        "3--3",
  month =        jun,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ginat:2002:EBP,
  author =       "David Ginat",
  title =        "Effective binary perspectives in algorithmic problem
                 solving",
  journal =      j-JERIC,
  volume =       "2",
  number =       "2",
  pages =        "4--4",
  month =        jun,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Conn:2002:IPV,
  author =       "Richard Conn",
  title =        "Introduction to programming with {Visual Basic}",
  journal =      j-JERIC,
  volume =       "2",
  number =       "3",
  pages =        "1--1",
  month =        sep,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Humphries:2002:IC,
  author =       "Jeffrey W. Humphries and Martin C. Carlisle",
  title =        "Introduction to {Cryptography}",
  journal =      j-JERIC,
  volume =       "2",
  number =       "3",
  pages =        "2--2",
  month =        sep,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Conn:2002:SSR,
  author =       "Richard Conn",
  title =        "Software Systems Requirements",
  journal =      j-JERIC,
  volume =       "2",
  number =       "4",
  pages =        "1--1",
  month =        dec,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fagin:2002:QAE,
  author =       "Barry S. Fagin and Laurence Merkle",
  title =        "Quantitative analysis of the effects of robots on
                 introductory {Computer Science} education",
  journal =      j-JERIC,
  volume =       "2",
  number =       "4",
  pages =        "1--17",
  month =        dec,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Griswold:2002:TSE,
  author =       "William G. Griswold",
  title =        "Teaching Software Engineering in a Compiler Project
                 Course",
  journal =      j-JERIC,
  volume =       "2",
  number =       "4",
  pages =        "1--18",
  month =        dec,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Joy:2002:IWB,
  author =       "Mike Joy and Boris Muzykantskii and Simon Rawles and
                 Michael Evans",
  title =        "An Infrastructure for {Web}-Based Computer-Assisted
                 Learning",
  journal =      j-JERIC,
  volume =       "2",
  number =       "4",
  pages =        "1--19",
  month =        dec,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gilder:2003:VTS,
  author =       "Jason Gilder and Michael Peterson and Jason Wright and
                 Travis Doom",
  title =        "A versatile tool for student projects: an {ASM}
                 programming language for the {Lego} mindstorm",
  journal =      j-JERIC,
  volume =       "3",
  number =       "1",
  pages =        "1--14",
  month =        mar,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Silva:2003:WTU,
  author =       "Elaine Silva and Dilvan Moriera",
  title =        "{WebCoM}: a tool to use peer review to improve student
                 interaction",
  journal =      j-JERIC,
  volume =       "3",
  number =       "1",
  pages =        "1--14",
  month =        mar,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Carr:2003:TPT,
  author =       "Steve Carr and Jean Mayo and Ching-Kuang Shene",
  title =        "{ThreadMentor}: a pedagogical tool for multithreaded
                 programming",
  journal =      j-JERIC,
  volume =       "3",
  number =       "1",
  pages =        "1--30",
  month =        mar,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Feb 3 18:43:37 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Holliday:2003:ACN,
  author =       "Mark A. Holliday",
  title =        "Animation of computer networking concepts",
  journal =      j-JERIC,
  volume =       "3",
  number =       "2",
  pages =        "1--26",
  month =        jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Null:2003:MMC,
  author =       "Linda Null and Julia Lobur",
  title =        "{MarieSim}: {The} {MARIE} computer simulator",
  journal =      j-JERIC,
  volume =       "3",
  number =       "2",
  pages =        "1--29",
  month =        jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chau:2003:TKT,
  author =       "Michael Chau and Zan Huang and Hsinchun Chen",
  title =        "Teaching key topics in computer science and
                 information systems through a {Web} search engine
                 project",
  journal =      j-JERIC,
  volume =       "3",
  number =       "3",
  pages =        "1--14",
  month =        sep,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:41 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Edwards:2003:ISP,
  author =       "Stephen H. Edwards",
  title =        "Improving student performance by evaluating how well
                 students test their own programs",
  journal =      j-JERIC,
  volume =       "3",
  number =       "3",
  pages =        "1--24",
  month =        sep,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:41 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blank:2003:PPB,
  author =       "Douglas Blank and Deepak Kumar and Lisa Meeden and
                 Holly Yanco",
  title =        "{Pyro}: a {Python}-based versatile programming
                 environment for teaching robotics",
  journal =      j-JERIC,
  volume =       "3",
  number =       "4",
  pages =        "1--15",
  month =        dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:41 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bair:2005:SIG,
  author =       "Bettina Bair and J. McGrath Cohoon",
  title =        "Special issue on gender-balancing computing
                 education",
  journal =      j-JERIC,
  volume =       "4",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:42 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Werner:2005:PPH,
  author =       "Linda L. Werner and Brian Hanks and Charlie McDowell",
  title =        "Pair-programming helps female computer science
                 students",
  journal =      j-JERIC,
  volume =       "4",
  number =       "1",
  pages =        "1--8",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:42 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{McKenna:2005:GBB,
  author =       "Peter McKenna",
  title =        "Gender and black boxes in the programming curriculum",
  journal =      j-JERIC,
  volume =       "4",
  number =       "1",
  pages =        "1--12",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:42 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lester:2005:CGP,
  author =       "Cynthia Y. Lester and Marcus Brown",
  title =        "Creating gender parity: an instruction aide's
                 influence",
  journal =      j-JERIC,
  volume =       "4",
  number =       "1",
  pages =        "1--14",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:42 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Berenson:2005:VWS,
  author =       "Sarah B. Berenson and Kelli M. Slaten and Laurie
                 Williams and Chih-Wei Ho",
  title =        "Voices of women in a software engineering course:
                 reflections on collaboration",
  journal =      j-JERIC,
  volume =       "4",
  number =       "1",
  pages =        "1--18",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:42 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Garvin-Doxas:2005:CCS,
  author =       "Kathy Garvin-Doxas and Lecia J. Barker",
  title =        "Communication in computer science classrooms:
                 understanding defensive climates as a means of creating
                 supportive behaviors",
  journal =      j-JERIC,
  volume =       "4",
  number =       "1",
  pages =        "1--18",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Tue Apr 26 17:40:42 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kumar:2004:ISIa,
  author =       "Deepak Kumar",
  title =        "Introduction to special issue on robotics in
                 undergraduate education",
  journal =      j-JERIC,
  volume =       "4",
  number =       "2",
  pages =        "1--1",
  month =        jun,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Thu Jul 7 12:24:09 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  remark =       "Although this issue is dated June 2004, it was not
                 published until July 2005.",
}

@Article{Verner:2004:RCL,
  author =       "Igor M. Verner and David J. Ahlgren",
  title =        "Robot contest as a laboratory for experiential
                 engineering education",
  journal =      j-JERIC,
  volume =       "4",
  number =       "2",
  pages =        "2--2",
  month =        jun,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Thu Jul 7 12:24:09 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kitts:2004:IFR,
  author =       "Christopher Kitts and Neil Quinn",
  title =        "An interdisciplinary field robotics program for
                 undergraduate computer science and engineering
                 education",
  journal =      j-JERIC,
  volume =       "4",
  number =       "2",
  pages =        "3--3",
  month =        jun,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Thu Jul 7 12:24:09 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sklar:2004:URU,
  author =       "Elizabeth Sklar and Simon Parsons and Peter Stone",
  title =        "Using {RoboCup} in university-level computer science
                 education",
  journal =      j-JERIC,
  volume =       "4",
  number =       "2",
  pages =        "4--4",
  month =        jun,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Thu Jul 7 12:24:09 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kumar:2004:ISIb,
  author =       "Deepak Kumar",
  title =        "Introduction to special issue on robotics in
                 undergraduate education",
  journal =      j-JERIC,
  volume =       "4",
  number =       "3",
  pages =        "1--1",
  month =        sep,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Sat Sep 17 14:21:54 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Imberman:2004:IAA,
  author =       "Susan P. Imberman",
  title =        "An intelligent agent approach for teaching neural
                 networks using {LEGO\reg{}} handy board robots",
  journal =      j-JERIC,
  volume =       "4",
  number =       "3",
  pages =        "1--12",
  month =        sep,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Sat Sep 17 14:21:54 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blank:2004:PPB,
  author =       "Douglas Blank and Deepak Kumar and Lisa Meeden and
                 Holly Yanco",
  title =        "{Pyro}: a python-based versatile programming
                 environment for teaching robotics",
  journal =      j-JERIC,
  volume =       "4",
  number =       "3",
  pages =        "1--15",
  month =        sep,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Sat Sep 17 14:21:54 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kumar:2004:TYU,
  author =       "Amruth N. Kumar",
  title =        "Three years of using robots in an artificial
                 intelligence course: lessons learned",
  journal =      j-JERIC,
  volume =       "4",
  number =       "3",
  pages =        "1--15",
  month =        sep,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Sat Sep 17 14:21:54 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{White:2004:SBN,
  author =       "Daniel R. White and Mike S. Joy",
  title =        "Sentence-based natural language plagiarism detection",
  journal =      j-JERIC,
  volume =       "4",
  number =       "4",
  pages =        "1--20",
  month =        dec,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Sat Sep 17 14:21:54 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Diwan:2004:PDS,
  author =       "Amer Diwan and William M. Waite and Michele H. Jackson
                 and Jacob Dickerson",
  title =        "{PL-detective}: a system for teaching programming
                 language concepts",
  journal =      j-JERIC,
  volume =       "4",
  number =       "4",
  pages =        "1--22",
  month =        dec,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Sat Sep 17 14:21:54 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kuban:2005:CMP,
  author =       "Paul A. Kuban and Rammohan K. Ragade",
  title =        "The {CAN} microcluster: {Parallel} processing over the
                 controller area network",
  journal =      j-JERIC,
  volume =       "5",
  number =       "1",
  pages =        "1--12",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Nov 23 05:13:45 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Feldman:2005:TQO,
  author =       "Yishai A. Feldman",
  title =        "Teaching quality object-oriented programming",
  journal =      j-JERIC,
  volume =       "5",
  number =       "1",
  pages =        "1--16",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Nov 23 05:13:45 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Carroll:2005:CLT,
  author =       "John M. Carroll and Mary Beth Rosson",
  title =        "A case library for teaching usability engineering:
                 {Design} rationale, development, and classroom
                 experience",
  journal =      j-JERIC,
  volume =       "5",
  number =       "1",
  pages =        "1--22",
  month =        mar,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Nov 23 05:13:45 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sutner:2005:CTD,
  author =       "Klaus Sutner",
  title =        "{CDM}: {Teaching} discrete mathematics to computer
                 science majors",
  journal =      j-JERIC,
  volume =       "5",
  number =       "2",
  pages =        "1--11",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Aug 23 12:04:05 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cigas:2005:TPA,
  author =       "John Cigas and Wen-Jung Hsin",
  title =        "Teaching proofs and algorithms in discrete mathematics
                 with online visual logic puzzles",
  journal =      j-JERIC,
  volume =       "5",
  number =       "2",
  pages =        "1--12",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Aug 23 12:04:05 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Harvey:2005:ESI,
  author =       "Valerie J. Harvey and Susan H. Rodger",
  title =        "Editorial for the special issue on software support
                 for teaching discrete mathematics",
  journal =      j-JERIC,
  volume =       "5",
  number =       "2",
  pages =        "1--16",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Aug 23 12:04:05 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cogliati:2005:RPV,
  author =       "Joshua J. Cogliati and Frances W. Goosey and Michael
                 T. Grinder and Bradley A. Pascoe and Rockford J. ROSS
                 and Cheston J. Williams",
  title =        "Realizing the promise of visualization in the theory
                 of computing",
  journal =      j-JERIC,
  volume =       "5",
  number =       "2",
  pages =        "1--17",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Aug 23 12:04:05 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gegg-Harrison:2005:CCM,
  author =       "Timothy S. Gegg-Harrison",
  title =        "Constructing contracts: {Making} discrete mathematics
                 relevant to beginning programmers",
  journal =      j-JERIC,
  volume =       "5",
  number =       "2",
  pages =        "1--28",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Aug 23 12:04:05 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
}

%%% TO DO: Are page numbers available for v5 n3?
@Article{Brusilovsky:2005:IES,
  author =       "Peter Brusilovsky and Sergey Sosnovsky",
  title =        "Individualized exercises for self-assessment of
                 programming knowledge: {An} evaluation of {QuizPACK}",
  journal =      j-JERIC,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Sep 27 05:45:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "6",
}

@Article{Brusilovsky:2005:PSI,
  author =       "Peter Brusilovsky and Colin Higgins",
  title =        "Preface to the special issue on automated assessment
                 of programming assignments",
  journal =      j-JERIC,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Sep 27 05:45:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
}

@Article{Douce:2005:ATB,
  author =       "Christopher Douce and David Livingstone and James
                 Orwell",
  title =        "Automatic test-based assessment of programming: a
                 review",
  journal =      j-JERIC,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Sep 27 05:45:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "4",
}

@Article{Higgins:2005:AAE,
  author =       "Colin A. Higgins and Geoffrey Gray and Pavlos
                 Symeonidis and Athanasios Tsintsifas",
  title =        "Automated assessment and experiences of teaching
                 programming",
  journal =      j-JERIC,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Sep 27 05:45:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "5",
}

@Article{Joy:2005:BOS,
  author =       "Mike Joy and Nathan Griffiths and Russell Boyatt",
  title =        "The boss online submission and assessment system",
  journal =      j-JERIC,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Sep 27 05:45:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "2",
}

@Article{Kumar:2005:GPA,
  author =       "Amruth N. Kumar",
  title =        "Generation of problems, answers, grade, and
                 feedback---case study of a fully automated tutor",
  journal =      j-JERIC,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Sep 27 05:45:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "3",
}

@Article{Malmi:2005:EAA,
  author =       "Lauri Malmi and Ville Karavirta and Ari Korhonen and
                 Jussi Nikander",
  title =        "Experiences on automatically assessed algorithm
                 simulation exercises with different resubmission
                 policies",
  journal =      j-JERIC,
  volume =       "5",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Wed Sep 27 05:45:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "7",
}

@Article{Turner:2005:MMA,
  author =       "Scott A. Turner and Manuel A. P{\'e}rez-Qui{\~n}ones
                 and Stephen H. Edwards",
  title =        "{minimUML}: a minimalist approach to {UML}
                 diagramming for early computer science education",
  journal =      j-JERIC,
  volume =       "5",
  number =       "4",
  pages =        "1:1--1:??",
  month =        dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1186639.1186640",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:03 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "In introductory computer science courses, the Unified
                 Modeling Language (UML) is commonly used to teach basic
                 object-oriented design. However, there appears to be a
                 lack of suitable software to support this task. Many of
                 the available programs that support UML focus on
                 developing code and not on enhancing learning. Programs
                 designed for educational use sometimes have poor
                 interfaces or are missing common and important features
                 such as multiple selection and undo/redo. Hence the
                 need for software that is tailored to an instructional
                 environment and that has all the useful and needed
                 functionality for that specific task. This is the
                 purpose of minimUML. It provides a minimum amount of
                 UML, just what is commonly used in beginning
                 programming classes, and a simple, usable interface. In
                 particular, minimUML is designed to support abstract
                 design while supplying features for exploratory
                 learning and error avoidance. It supports functionality
                 that includes multiple selection, undo/redo, flexible
                 printing, cut and paste, and drag and drop. In
                 addition, it allows for the annotation of diagrams,
                 through text or free-form drawings, so students can
                 receive feedback on their work. minimUML was developed
                 with the goals of supporting ease of use, of supporting
                 novice students, and of requiring no prior training for
                 its use. This article presents the rationale behind the
                 minimUML design, a description of the tool, and the
                 results of usability evaluations and student feedback
                 on the use of the tool.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "education; human-computer interaction; learning;
                 minimalist design; UML",
}

@Article{Soh:2005:FCC,
  author =       "Leen-Kiat Soh and Ashok Samal and Gwen Nugent",
  title =        "A framework for {CS1} closed laboratories",
  journal =      j-JERIC,
  volume =       "5",
  number =       "4",
  pages =        "2:1--2:??",
  month =        dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1186639.1186641",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:03 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Closed laboratories are becoming an increasingly
                 popular approach to teaching introductory computer
                 science courses, as they facilitate structured
                 problem-solving and cooperation. However, most closed
                 laboratories have been designed and implemented without
                 embedded instructional research components for constant
                 evaluation of the laboratories' effectiveness. As a
                 result, it is not convenient to maintain and improve
                 the laboratories over time so that they adapt to
                 changing CS topics, curricula, and student needs. This
                 article reports on an integrated framework for
                 designing, implementing, and maintaining laboratories
                 with embedded instructional research design. Although
                 the activities reported here are part of our
                 department-wide effort to cover CS0, CS1, and CS2, we
                 focus here on the design and implementation of the labs
                 for CS1.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "closed laboratories; cooperative learning;
                 instructional design",
}

@Article{Grimes:2005:CGI,
  author =       "Douglas Grimes and Mark Warschauer and Tara Hutchinson
                 and Falko Kuester",
  title =        "Computer graphics instruction in {VizClass}",
  journal =      j-JERIC,
  volume =       "5",
  number =       "4",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1186639.1186642",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:03 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "VizClass is a university classroom environment
                 designed to offer students in computer graphics and
                 engineering courses up-to-date visualization
                 technologies. Three digital whiteboards and a
                 three-dimensional stereoscopic display provide
                 complementary display surfaces. Input devices include
                 touchscreens on the digital whiteboards, remote
                 keyboards, data gloves, and hand-position sensors. We
                 use observations, interviews, and surveys to examine
                 the pedagogical impacts of VizClass for teaching and
                 learning computer graphics and virtual reality.
                 Preliminary findings include positive student and
                 teacher attitudes and greater learner engagement in
                 after-class collaborations.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  keywords =     "engagement; graphics programming; visualization
                 classroom; visualization environment; VizClass",
}

@Article{Roy:2006:DEP,
  author =       "Geoffrey G. Roy",
  title =        "Designing and explaining programs with a literate
                 pseudocode",
  journal =      j-JERIC,
  volume =       "6",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1217862.1217863",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Designing and explaining programs are often difficult
                 tasks, especially when novices are involved. It also
                 concerns more experienced programmers when complex
                 algorithms need to be carefully explained and
                 documented as part of software development. Good
                 practice suggests that code and documentation be
                 tightly coupled; but there are only a few support tools
                 specifically targeted at novices that require this as
                 an integral part of the programming process. We propose
                 a new tool design with this objective in mind: P-Coder
                 gives a flexible descriptive view of the program via
                 pseudocode notation within a graphical tree-structured
                 model, from which the complete algorithm can be
                 specified to retain the informal description integrated
                 with the final code. Thus the code meets some of the
                 key requirements for realizing a literate program.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "literate programming; novices; pseudocode",
}

@Article{Marshall:2006:MDL,
  author =       "Byron B. Marshall and Hsinchun Chen and Rao Shen and
                 Edward A. Fox",
  title =        "Moving digital libraries into the student learning
                 space: {The} {GetSmart} experience",
  journal =      j-JERIC,
  volume =       "6",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1217862.1217864",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "The GetSmart system was built to support theoretically
                 sound learning processes in a digital library
                 environment by integrating course management, digital
                 library, and concept mapping components to support a
                 constructivist, six-step, information search process.
                 In the fall of 2002 more than 100 students created 1400
                 concept maps as part of selected computing classes
                 offered at the University of Arizona and Virginia Tech.
                 Those students conducted searches, obtained course
                 information, created concept maps, collaborated in
                 acquiring knowledge, and presented their knowledge
                 representations. This article connects the design
                 elements of the GetSmart system to targeted
                 concept-map-based learning processes, describes our
                 system and research testbed, and analyzes our system
                 usage logs. Results suggest that students did in fact
                 use the tools in an integrated fashion, combining
                 knowledge representation and search activities. After
                 concept mapping was included in the curriculum, we
                 observed improvement in students' online quiz scores.
                 Further, we observed that students in groups
                 collaboratively constructed concept maps with multiple
                 group members viewing and updating map details.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "concept maps; digital libraries; education",
}

@Article{Teo:2006:KDM,
  author =       "Chao Boon Teo and Robert Kheng Leng Gay",
  title =        "A knowledge-driven model to personalize e-learning",
  journal =      j-JERIC,
  volume =       "6",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1217862.1217865",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This article highlights basic issues that have
                 hindered e-learning systems from becoming the
                 revolutionary force it could be for education. While
                 current systems aim to foster significant improvements
                 in learning, this article argues that most systems are
                 still limited to just being online repositories. This
                 and the lack of learning personalization has become a
                 topic for research. A knowledge-driven model to
                 personalize e-learning is proposed in this article. A
                 novel methodology for eliciting and personalizing tacit
                 knowledge is presented. We focus on describing the
                 complex information processing in terms of knowledge,
                 rather than the details of its implementation.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  keywords =     "concept map; distance learning; e-learning;
                 instructional design; knowledge management",
}

@Article{Koldehofe:2006:LEE,
  author =       "Boris Koldehofe and Marina Papatriantafilou and
                 Philippas Tsigas",
  title =        "{LYDIAN}: {An} extensible educational animation
                 environment for distributed algorithms",
  journal =      j-JERIC,
  volume =       "6",
  number =       "2",
  pages =        "1:1--1:??",
  month =        jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1236201.1236202",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "LYDIAN is an environment to support the teaching and
                 learning of distributed algorithms. It provides a
                 collection of distributed algorithms as well as
                 continuous animations. Users can combine algorithms and
                 animations with arbitrary network structures defining
                 the interconnection and behavior of the distributed
                 algorithm. Further, it facilitates the creation of
                 algorithm descriptions as well as the creation of
                 network structures. This makes LYDIAN a flexible tool
                 to be used with students with different skills and
                 backgrounds. This article gives an overview about
                 various ideas and concepts behind LYDIAN by describing
                 in detail the framework for an educational
                 visualization and simulation environment for
                 learning/teaching distributed algorithms as well as
                 discussing possible extensions, which may improve
                 possibilities for user interaction. Moreover, in our
                 effort to understand better what visualization and
                 simulation environments, such as LYDIAN, need to
                 provide, we show results taken from a case study
                 integrating LYDIAN in an undergraduate
                 distributed-systems course.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "distributed algorithms",
}

@Article{Nutt:2006:ASC,
  author =       "Gary Nutt",
  title =        "Addressing small computers in the first {OS} course",
  journal =      j-JERIC,
  volume =       "6",
  number =       "2",
  pages =        "2:1--2:??",
  month =        jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1236201.1236203",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Small computers are emerging as important components
                 of the contemporary computing scene. Their operating
                 systems vary from specialized software for an embedded
                 system to the same style of OS used on a generic
                 desktop or server computer. This article describes a
                 course in which systems are classified by their
                 hardware capability and the traditional OS topic areas
                 are then dissected, augmented, reassembled, and
                 reorganized to illustrate the aspects of each topic as
                 applicable to each class of small computers.
                 Ultimately, the course covers the same material as a
                 conventional OS course, but from a new perspective.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "dedicated systems; embedded systems; managed
                 processes; OS organization; small computers; trusted
                 processes",
}

@Article{Frincke:2006:ESI,
  author =       "D. Frincke and S. Oudekirk and B. Popovsky",
  title =        "Editorial: {Special} issue on resources for the
                 computer security and information assurance curriculum:
                 {Issue 1}",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "1:1--1:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243482",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This editorial introduces a set of articles in the
                 JERIC special issue on resources for the computer
                 security and information assurance curriculum. It
                 begins with a discussion of why such a special edition
                 is needed and continues by outlining the articles in
                 this volume, as follows: an innovative model for
                 security education based on teaching hospitals;
                 teaching context in computer security through
                 metaphors; tools supporting exploration of
                 cryptography; suggestions for a hands-on Linux course
                 geared towards a student population that includes
                 noncomputer scientists; and finally, projects suitable
                 for a course in computer forensics.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "computer forensics; protection; security",
}

@Article{Goel:2006:IMI,
  author =       "Sanjay Goel and Damira Pon and Peter Bloniarz and
                 Robert Bangert-Drowns and George Berg and Vince Delio
                 and Laura Iwan and Thomas Hurbanek and Sandoor P.
                 Schuman and Jagdish Gangolly and Adnan Baykal and Jon
                 Hobbs",
  title =        "Innovative model for information assurance curriculum:
                 {A} teaching hospital",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "2:1--2:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243483",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "A novel idea for information security education
                 created by the New York State Center for Information
                 Forensics and Assurance (CIFA) is presented. This new
                 approach incorporates a teaching hospital model
                 originally developed for medical training. In this
                 model, information security problems from industry and
                 government are solved and abstracted into living-cases
                 used for training and education of university students
                 and public-sector employees. Such a model helps ensure
                 that the curriculum stays current even as the field of
                 information assurance continues to evolve. Solving
                 industry problems hones research skills, while exposing
                 students to living cases helps build context for
                 concepts in information assurance. The success of this
                 approach is contingent upon strong partnerships with
                 government and private organizations that have real
                 security issues as well as an active research program
                 in information security that involves faculty and
                 students. This article presents an implementation of
                 this approach at CIFA. Development of the curriculum,
                 observations gleaned through dissemination of the
                 curriculum, and the infrastructure developed to support
                 this concept are discussed. Evaluation of students has
                 demonstrated the effectiveness of the ``teaching
                 hospital'' concept and provided us with feedback to
                 further refine its implementation.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "case-based learning; cases; constructivism; education;
                 information assurance; information security education;
                 learning; problem-based learning; teaching hospital",
}

@Article{Bishop:2006:TCI,
  author =       "Matt Bishop",
  title =        "Teaching context in information security",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "3:1--3:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243484",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This article investigates teaching the application of
                 technical ideas by non-technical means, especially by
                 using puzzles to engage students. After discussing the
                 need to teach students to evaluate contexts in which
                 decisions about computer security must be made, we
                 suggest questions and scenarios drawn from political
                 science, history, as well as other humanities, to force
                 students to apply or derive principles of computer
                 security in unusual and unexpected situations. Our
                 experience shows that students find the process
                 enjoyable, stimulating, and effective.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  keywords =     "computer security; environment; instruction;
                 judgment",
}

@Article{Garcia-Pasquel:2006:GCT,
  author =       "Jes{\'u}s Adolfo Garc{\'\i}a-Pasquel and Jos{\'e}
                 Galaviz",
  title =        "{Ganz{\'u}a}: a cryptanalysis tool for
                 monoalphabetic and polyalphabetic ciphers",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "4:1--4:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243485",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Many introductory courses to cryptology and computer
                 security start with or include a discussion of
                 classical ciphers that usually contemplates some
                 cryptanalysis techniques used to break them. Ganz{\'u}a
                 (picklock in Spanish) is an application designed to
                 assist the cryptanalysis of ciphertext obtained with
                 monoalphabetic or polyalphabetic ciphers. It can use
                 almost arbitrary character sets for the plain and
                 cipher alphabets as well as obtain the standard
                 relative frequencies of many languages and provide
                 other useful data.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  keywords =     "classical cryptography; cryptology",
}

@Article{Shumba:2006:THL,
  author =       "Rose Shumba",
  title =        "Teaching hands-on {Linux} host computer security",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "5:1--5:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243486",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "In the summer of 2003, a project to augment and
                 improve the teaching of information assurance courses
                 was started at IUP. Thus far, ten hands-on exercises
                 have been developed. The exercises described in this
                 article, and presented in the appendix, are based on
                 actions required to secure a Linux host. Publicly
                 available resources were used to develop the exercises,
                 which have been successfully utilized since spring 2003
                 to teach cybersecurity basics classes. The experiences
                 and challenges encountered in teaching the course and
                 possible future work are also described.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  keywords =     "computer security; cryptography; file integrity; file
                 permissions; host security exercises; user accounts",
}

@Article{Harrison:2006:TPC,
  author =       "Warren Harrison",
  title =        "A term project for a course on computer forensics",
  journal =      j-JERIC,
  volume =       "6",
  number =       "3",
  pages =        "6:1--6:??",
  month =        sep,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1243481.1243487",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "The typical approach to creating an examination disk
                 for exercises and projects in a course on computer
                 forensics is for the instructor to populate a piece of
                 media with evidence to be retrieved. While such an
                 approach supports the simple use of forensic tools, in
                 many cases the use of an instructor-developed
                 examination disk avoids utilizing some key aspects of a
                 digital investigation by overly focusing on the
                 mechanics of retrieval. We recently developed a course
                 on computer forensics that utilized a large-scale,
                 team-based term project involving the forensics
                 examination of a computer system. In this article we
                 describe an approach for providing examination disks
                 for student use in a term project that reinforces the
                 investigative aspect of the process.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  keywords =     "computer crime; computer evidence; student projects",
}

@Article{Frincke:2006:ERC,
  author =       "D. Frincke and S. Oudekirk and B. Popovsky",
  title =        "Editorial: {Resources} for the computer security and
                 information assurance curriculum",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "1:1--1:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248454",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This editorial introduces the articles in this
                 companion issue to the first JERIC special issue on
                 Computer Security and Information Assurance Curriculum.
                 It includes an article that supports making computer
                 security education more accessible through a portable
                 network, and one on lessons learned in developing a
                 workshop for educators. Other articles outline
                 laboratory exercises especially suitable for distance
                 or online education, illustrate ways to teach students
                 about threats, and provide approaches to classroom
                 discussion of disaster recovery.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "computer forensics; protection; security",
}

@Article{Rosenberg:2006:TNR,
  author =       "Timothy Rosenberg and Lance J. Hoffman",
  title =        "Taking the network on the road: {Portable} network
                 solutions for computer security educators",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "2:1--2:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248455",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Educational institutions that wish to implement a
                 specialized teaching laboratory often have a variety of
                 obstacles to overcome. Some of these obstacles are
                 related to adapting existing classroom infrastructure,
                 building the laboratory, and meeting the demands for
                 multiple-use classrooms to maximize the return on
                 investment. In some cases, such as computer security,
                 they must also maintain a controlled environment.
                 Portable educational networks of computers allow
                 teaching specialized topics that have heretofore
                 required specialized laboratories in existing
                 classrooms. Their flexibility allows them to be used
                 for a variety of content---operating systems,
                 networking, security, and forensics. These systems are
                 in use today supporting undergraduate, graduate, and
                 professional education.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "closed laboratories; computer security; cooperative
                 learning; information assurance; information security;
                 instructional design",
}

@Article{Wagner:2006:PCS,
  author =       "Paul J. Wagner and Andrew T. Phillips",
  title =        "A portable computer security workshop",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248456",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "We have developed a computer security workshop
                 designed to instruct post-secondary instructors who
                 want to start a course or laboratory exercise sequence
                 in computer security. This workshop has also been used
                 to provide computer security education to IT
                 professionals and students. It is effective in
                 communicating basic computer security principles as
                 well as an understanding of some of the significant
                 tools and techniques in this area. Evaluations of the
                 workshop have been very positive; we will offer the
                 workshop locally, regionally, and nationally in the
                 next year. The materials from this workshop are
                 available at
                 \url{http://clics.cs.uwec.edu/workshopmaterials.htm}.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  keywords =     "computer security; laboratory exercises; portable
                 workshop",
}

@Article{Bhagyavati:2006:LEO,
  author =       "Bhagyavati",
  title =        "Laboratory exercises in online information assurance
                 courses",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248457",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Information assurance courses delivered in an online
                 environment pose challenges to the development of
                 meaningful hands-on exercises for students. This
                 article presents techniques on furnishing laboratory
                 exercises to online students and presents examples of
                 assignments drawn from the author's experiences in
                 teaching online courses for over three years. These
                 assignments have proven successful in enhancing the
                 learning experiences of undergraduate and graduate
                 computer science students in introductory and advanced
                 courses in the area of information assurance. Typical
                 courses include introduction to computer networks,
                 computer and network security, information assurance,
                 network management, wireless networks and applications,
                 computer forensics, and risk assessment.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  keywords =     "blended courses; hands-on; information assurance;
                 infrastructure safeguards; network security; online
                 learning",
}

@Article{Brustoloni:2006:LEN,
  author =       "Jos{\'e} Carlos Brustoloni",
  title =        "Laboratory experiments for network security
                 instruction",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248458",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "We describe a sequence of five experiments on network
                 security that cast students successively in the roles
                 of computer user, programmer, and system administrator.
                 Unlike experiments described in several previous
                 papers, these experiments avoid placing students in the
                 role of attacker. Each experiment starts with an
                 in-class demonstration of an attack by the instructor.
                 Students then learn how to use open-source defense
                 tools appropriate for the role they are playing and the
                 attack at hand. Threats covered include eavesdropping,
                 dictionary, man-in-the-middle, port scanning, and
                 fingerprinting attacks. Defense skills gained by
                 students include how to forward ports with OpenSSH, how
                 to prevent weak passwords with CrackLib, how to salt
                 passwords, how to set up a simple certifying authority,
                 issue and verify certificates, and guarantee
                 communication confidentiality and integrity using
                 OpenSSL, and how to set up firewalls and IPsec-based
                 virtual private networks. At two separate offerings,
                 tests taken before and after each experiment showed
                 that each has a statistically significant and large
                 effect on students' learning. Moreover, surveys show
                 that students finish the sequence of experiments with
                 high interest in further studies and work in the area
                 of security. These results suggest that the experiments
                 are well-suited for introductory security or networking
                 courses.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  keywords =     "certificate; certifying authority; course; dictionary
                 attack; eavesdropping; education; experiment;
                 fingerprinting; firewall; IPsec; man-in-the-middle;
                 password; port scanning; security; SSH; SSL; VPN",
}

@Article{Landry:2006:DCD,
  author =       "Brett J. L. Landry and M. Scott Koger",
  title =        "Dispelling 10 common disaster recovery myths:
                 {Lessons} learned from {Hurricane Katrina} and other
                 disasters",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248459",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Disasters happen all the time; yet despite this, many
                 organizations are caught unprepared or make unrealistic
                 assumptions. These factors create environments that
                 will fail during a disaster. Most information
                 technology (IT) curricula do not cover disaster
                 recovery (DR) plans and strategies in depth. The
                 unfortunate result is that most new computer systems
                 are implemented without sufficient disaster recovery
                 plans and testing. Courses on network security need to
                 examine DR as a real threat and cover it as a core
                 module. By dispelling the 10 common myths,
                 organizations can better plan, develop, and test true
                 DR plans.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  keywords =     "backups; business continuity; disaster recovery;
                 hardware failures; IT curricula; network attacks;
                 software failures; viruses; worms",
}

@Article{McCartney:2007:ENV,
  author =       "Robert McCartney and Josh Tenenberg",
  title =        "From the editors: a new vision for {JERIC}",
  journal =      j-JERIC,
  volume =       "7",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "As the new Editors-in-Chief, we outline our vision for
                 building JERIC to become the premier journal in
                 computing education. Doing so will require authors who
                 submit high-quality articles --- their ``best stuff'',
                 reviewers who provide the feedback and guidance to
                 ensure that each article embodies a scholarly approach
                 to teaching and learning while being of practical use
                 to the computing educator, and readers who read the
                 articles, critically evaluate and discuss the findings
                 with others, and adapt, adopt, and evaluate these
                 findings in their own classrooms.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "manuscript review criteria; scholarship of teaching
                 and learning",
}

@Article{Coelho:2007:CSD,
  author =       "Wesley Coelho and Gail Murphy",
  title =        "{ClassCompass}: a software design mentoring system",
  journal =      j-JERIC,
  volume =       "7",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Becoming a quality software developer requires
                 practice under the guidance of an expert mentor.
                 Unfortunately, in most academic environments, there are
                 not enough experts to provide any significant design
                 mentoring for software engineering students. To address
                 this problem, we present a collaborative software
                 design tool intended to maximize an instructor's
                 ability to mentor a group of students. Students use the
                 system to create software designs for a given set of
                 requirements. While they work, students receive
                 automated feedback regarding common design mistakes.
                 The system then provides support and guidance for
                 students to manually critique each other's work.
                 Students can view and learn from the design approaches
                 taken by other students, as well as the critiques
                 associated with them. We have tried this approach in
                 software engineering classes with some positive
                 results. We believe that this collaborative and
                 partially automated approach can significantly improve
                 the quality of software design education when few
                 mentors are available.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "collaborative education; design critiquing",
}

@Article{Hendry:2007:HPC,
  author =       "David G. Hendry",
  title =        "History places: a case study for relational database
                 and information retrieval system design",
  journal =      j-JERIC,
  volume =       "7",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This article presents a project-based case study that
                 was developed for students with diverse backgrounds and
                 varied inclinations for engaging technical topics. The
                 project, called History Places, requires that student
                 teams develop a vision for a kind of digital library,
                 propose a conceptual model, and use the model to derive
                 a logical model and information retrieval
                 specification. From these two design representations,
                 students implement a data-driven Web site that enables
                 users to browse content and search by exact and
                 best-match queries. The project brief contains a set of
                 general requirements that promote creative solutions,
                 while also bounding the complexity of the solution
                 space. The article includes teaching notes and a
                 conceptual model, expressed as an enhanced
                 entity-relationship model in UML. The model, consisting
                 of approximately ten entities, contains binary, unary,
                 ternary, and specialization/generalization
                 relationships. The article concludes with some
                 reflections based on the experiences of using this
                 project in six classes over four years.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  keywords =     "case-based learning; conceptual modeling; database
                 management systems; design; education; informatics;
                 information retrieval; Lucene; PostgreSQL; UML",
}

@Article{Tenenberg:2007:CSL,
  author =       "Josh Tenenberg and Robert McCartney",
  title =        "Computer science in a liberal arts context",
  journal =      j-JERIC,
  volume =       "7",
  number =       "2",
  pages =        "1:1--1:??",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1240200.1240201",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This issue is devoted to the curriculum guidelines
                 from the Liberal Arts Computer Science Consortium.
                 These guidelines provide a coherent and important model
                 for computing education within a liberal arts context,
                 giving primacy to critical reason, rigorous methods,
                 and student engagement in the research process. In this
                 regard, they are at the same time both conservative, by
                 giving low priority to the latest technologies, and
                 radical by resisting the managerial impulse that at its
                 worst commodifies and devalues higher education.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "computing curriculum guidelines; LACS; liberal arts",
}

@Article{Consortium:2007:MCL,
  author =       "Liberal Arts Computer Science Consortium",
  title =        "A 2007 model curriculum for a liberal arts degree in
                 computer science",
  journal =      j-JERIC,
  volume =       "7",
  number =       "2",
  pages =        "2:1--2:??",
  month =        jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1240200.1240202",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "computing curriculum guidelines; LACS; liberal arts",
}

@Article{McCartney:2007:WE,
  author =       "Robert McCartney and Josh Tenenberg",
  title =        "Why Evidence?",
  journal =      j-JERIC,
  volume =       "7",
  number =       "3",
  pages =        "1:1--1:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1281320.1281321",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:56 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "A goal of JERIC is to support educational practice by
                 publishing articles that are useful to classroom
                 instructors. One way of ensuring this utility is to
                 require that claims are backed up by evidence. This
                 evidence allows the reader to evaluate the potential
                 effectiveness and transferability of any approaches
                 presented in these articles to their own courses and
                 situations.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "evidence-based education",
}

@Article{Greitzer:2007:CSI,
  author =       "Frank L. Greitzer and Olga Anna Kuchar and Kristy
                 Huston",
  title =        "Cognitive science implications for enhancing training
                 effectiveness in a serious gaming context",
  journal =      j-JERIC,
  volume =       "7",
  number =       "3",
  pages =        "2:1--2:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1281320.1281322",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:56 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Serious games use entertainment principles,
                 creativity, and technology to meet government or
                 corporate training objectives, but these principles
                 alone will not guarantee that the intended learning
                 will occur. To be effective, serious games must
                 incorporate sound cognitive, learning, and pedagogical
                 principles into their design and structure. In this
                 paper, we review cognitive principles that can be
                 applied to improve the training effectiveness in
                 serious games and we describe a process we used to
                 design improvements for an existing game-based training
                 application in the domain of cyber security
                 education.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "cognitive principles; computer-based training; cyber
                 security education; serious gaming; training
                 effectiveness",
}

@Article{Tenenberg:2008:LQE,
  author =       "Josh Tenenberg and Robert McCartney",
  title =        "Linking questions and evidence",
  journal =      j-JERIC,
  volume =       "7",
  number =       "4",
  pages =        "1:1--1:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1316450.1316451",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This special issue features a set of papers recently
                 published in the 3rd International Workshop on
                 Computing Education Research (ICER'07). The papers were
                 selected because they closely meet the publication
                 criteria for ACM/JERIC: stemming from computing
                 education practice, grounded in relevant literature,
                 containing analysis of primary empirical data collected
                 to support specific claims, and providing implications
                 for practice. In addition, the diverse set of research
                 methods used demonstrates how empirical methods can be
                 chosen to serve the specific questions of interest,
                 whether for purposes of research or for improvement of
                 teaching practice. This set of papers can therefore
                 serve as exemplars and resources for the educator
                 wishing to develop a wider range of tools for probing
                 issues of teaching and learning within the classroom.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "empirical methods; evidence; quasi-experiment;
                 research methods",
}

@Article{Hanks:2008:PEN,
  author =       "Brian Hanks",
  title =        "Problems encountered by novice pair programmers",
  journal =      j-JERIC,
  volume =       "7",
  number =       "4",
  pages =        "2:1--2:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1316450.1316451",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "In a study of the types of problems encountered by
                 students that led them to seek assistance, Robins et
                 al. [2006] found that the most common problems were
                 related to trivial mechanics. The students in this
                 study worked by themselves on their programming
                 exercises. This article discusses a replication of the
                 Robins et al. study in which the subjects pair
                 programmed. The types of problems encountered by the
                 pairing students were similar to those of the solo
                 students. The number of problems requiring assistance
                 was much smaller for the pairing students, which
                 suggests that they were able to resolve more problems
                 on their own.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "computer science education; CS1; errors; novice; pair
                 programming",
}

@Article{Sajaniemi:2008:SDS,
  author =       "Jorma Sajaniemi and Marja Kuittinen and Taina
                 Tikansalo",
  title =        "A study of the development of students' visualizations
                 of program state during an elementary object-oriented
                 programming course",
  journal =      j-JERIC,
  volume =       "7",
  number =       "4",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1316450.1316453",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Students' understanding of object-oriented (OO)
                 program execution was studied by asking students to
                 draw a picture of a program state at a specific moment.
                 Students were given minimal instructions on what to
                 include in their drawings in order to see what they
                 considered to be central concepts and relationships in
                 program execution. Three drawing tasks were given at
                 different phases of an elementary OO programming course
                 where two animation tools were used for program
                 visualization. The drawings were analyzed for their
                 overall approaches and their detailed
                 contents.\par

                 There was a large variability in the overall approaches
                 and the popularity of various approaches changed during
                 the course. The results indicate that students' mental
                 representations of OO concepts and program execution
                 not only grow as new material is covered in teaching,
                 but they also change. The first drawings treat methods
                 as having primarily a static existence; later methods
                 are seen as dynamic invocations that call each other.
                 The role of classes in program execution fluctuates
                 during learning, indicating problems in locating the
                 notion of class with respect to, for example, objects.
                 Two major sources of problems that manifested in many
                 different forms were the relationship between object
                 and method, and the role of the main method with
                 respect to program state. Other problems were caused by
                 overly simplistic understanding of object
                 identification and improper use of application domain
                 knowledge.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  keywords =     "CS1/2; mental representation; object-oriented
                 programming; program state; visualization",
}

@Article{Chinn:2008:USV,
  author =       "Donald Chinn and Tammy Vandegrift",
  title =        "Uncovering student values for hiring in the software
                 industry",
  journal =      j-JERIC,
  volume =       "7",
  number =       "4",
  pages =        "4:1--4:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1316450.1316454",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "This article provides an analysis of student responses
                 to an exercise used in a computer ethics and a software
                 engineering course to raise awareness of issues related
                 to hiring, including issues of professional
                 responsibility and diversity. Students from two
                 different universities were asked to evaluate four
                 candidates for two positions in a fictitious software
                 company. They then developed a set of criteria for
                 evaluation and constructed an argument to support their
                 choices. After discussing their choice with others in
                 the class, students could change their hiring
                 decisions. Students' hiring criteria were coded using
                 emergent categories, inferences in the arguments were
                 coded according to the criteria, and reasons for
                 changing hiring decisions were coded. Students
                 considered criteria that fell into five areas:
                 technical skills, soft skills, personal traits,
                 previous employment, and career/job considerations.
                 Reasons for changing hiring choices included previous
                 experience, diversity considerations, people skills,
                 leadership skills, and reaching consensus. The article
                 also reports inferences students made about the job
                 candidates.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  keywords =     "diversity; ethics; hiring criteria",
}

@Article{Simon:2008:FYS,
  author =       "Beth Simon and Brian Hanks",
  title =        "First-year students' impressions of pair programming
                 in {CS1}",
  journal =      j-JERIC,
  volume =       "7",
  number =       "4",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1316450.1316455",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Pair programming, as part of the Agile Development
                 process, has noted benefits in professional software
                 development scenarios. These successes have led to a
                 rise in use of pair programming in educational
                 settings, particularly in Computer Science 1 (CS1).
                 Specifically, McDowell et al. [2006] has shown that
                 students using pair programming in CS1 do better in a
                 CS2 class (with solo programming) than students who
                 don't pair in CS1. This paper seeks to address a
                 similar question, but from a qualitative,
                 student-focused approach. How do students define,
                 experience, and value the pair programming experience?
                 How do they experience and value it compared to solo
                 programming? Does pairing in CS1 impact their
                 confidence in their abilities?\par

                 We report on semi-structured interviews with 11
                 subjects from two institutions where pair programming
                 was used in CS1, and solo programming was used in the
                 CS2. Many of the responses met our expectations;
                 students get stuck less and explore more ideas while
                 pairing, and believe that pair programming helped them
                 in CS1. Other responses were more surprising. Students
                 reported that when solo programming they were more
                 confident and understood their programs better. Many
                 students also said that they started work on their
                 assignments earlier when soloing. Students also
                 continue to use other students as resources even when
                 working 'solo.'",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  keywords =     "CS1; debugging; interview; novice; pair programming;
                 qualitative",
}

@Article{Yarosh:2008:NDS,
  author =       "Svetlana Yarosh and Mark Guzdial",
  title =        "Narrating data structures: {The} role of context in
                 {CS2}",
  journal =      j-JERIC,
  volume =       "7",
  number =       "4",
  pages =        "6:1--6:??",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1316450.1316456",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Learning computing with respect to the context of its
                 use has been linked in previous reports to student
                 motivation in introductory Computer Science (CS)
                 courses. In this report, we consider the role of
                 context in a second course. We present a case study of
                 a CS2 data structures class that uses a media
                 computation context. In this course, students learn
                 data structures and object-oriented (OO) programming
                 through a pervasive narrative about how real media
                 professionals use data structures to model the real
                 world and to construct the digital images, sounds, and
                 animations with which the students are familiar in
                 their daily lives. We found that context played a
                 different role in a second course than in a first
                 course. We found evidence that some students did not
                 need context to appreciate computing, but we also found
                 evidence that context can help students get engaged
                 with the material that they otherwise do not find
                 interesting. In particular, the narrative aspect of a
                 context may help students in relating the elements of
                 the course and may even help with learning.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  keywords =     "course design; CS1/2; media computation",
}

@Article{McCartney:2008:CJ,
  author =       "Robert McCartney and Josh Tenenberg",
  title =        "From Conference to Journal",
  journal =      j-JERIC,
  volume =       "8",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1348713.1348714",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:13:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Revising and extending conference articles for journal
                 publication benefits both authors and readers. The new
                 articles are more complete, and benefit from peer
                 review, feedback from conference presentation, and
                 greater editorial consistency. For those articles that
                 are appropriate, we encourage authors to do this, and
                 present two examples of such articles in this issue.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  keywords =     "conference; journal; publication",
}

@Article{Gestwicki:2008:TDP,
  author =       "Paul Gestwicki and Fu-Shing Sun",
  title =        "Teaching Design Patterns Through Computer Game
                 Development",
  journal =      j-JERIC,
  volume =       "8",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1348713.1348715",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:13:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "We present an approach for teaching design patterns
                 that emphasizes object-orientation and patterns
                 integration. The context of computer game development
                 is used to engage and motivate students, and it is
                 additionally rich with design patterns. A case study is
                 presented based on EEClone, an arcade-style computer
                 game implemented in Java. Our students analyzed various
                 design patterns within EEClone, and from this
                 experience, learned how to apply design patterns in
                 their own game software. The six principal patterns of
                 EEClone are described in detail, followed by a
                 description of our teaching methodology, assessment
                 techniques, and results.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  keywords =     "assessment; design patterns; games in education; UML",
}

@Article{Du:2008:SSI,
  author =       "Wenliang Du and Ronghua Wang",
  title =        "{SEED}: a Suite of Instructional Laboratories for
                 Computer Security Education",
  journal =      j-JERIC,
  volume =       "8",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1348713.1348716",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:13:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "The security and assurance of our computing
                 infrastructure has become a national priority. To
                 address this priority, higher education has gradually
                 incorporated the principles of computer and information
                 security into the mainstream undergraduate and graduate
                 computer science curricula. To achieve effective
                 education, learning security principles must be
                 grounded in experience. This calls for effective
                 laboratory exercises (or course projects). Although a
                 number of laboratories have been designed for security
                 education, they only cover a small portion of the
                 fundamental security principles. Moreover, their
                 underlying lab environments are different, making
                 integration of these laboratories infeasible for a
                 semester-long course. Currently, security laboratories
                 that can be widely adopted are still lacking, and they
                 are in great demand in security education.\par

                 We have developed a novel laboratory environment
                 (referred to as SEED). The SEED environment consists of
                 Minix, an instructional operating system (OS), and
                 Linux, a production OS; it takes advantage of the
                 simplicity of Minix and the completeness of Linux, and
                 provides a unified platform to support a rich set of
                 laboratories for computer security education. Based on
                 the SEED environment, we have developed a list of
                 laboratories that cover a wide spectrum of security
                 principles. These labs provide opportunities for
                 students to develop essential skills for secure
                 computing practice. We have been using these labs in
                 our courses during the last five years. This article
                 presents our SEED environment, laboratories, and
                 evaluation results.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  keywords =     "education; instructional laboratories; security",
}

@Article{Tenenberg:2008:GST,
  author =       "Josh Tenenberg and Robert McCartney",
  title =        "Grounding the Scholarship of Teaching and Learning in
                 Practice",
  journal =      j-JERIC,
  volume =       "8",
  number =       "2",
  pages =        "4:1--4:??",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1362787.1362788",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:13:14 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "We invite submissions to ACM/JERIC from teaching
                 practitioners who are our readers. Grounding these
                 submissions in the lived practice of teaching; using
                 data that is already collected to assess student
                 learning; and reporting the data collection, analysis,
                 and context of use accurately and honestly are key
                 aspects for taking a scholarly approach to teaching and
                 learning. We hope to see more such scholarly inquiries
                 by computing educators in the pages of future issues.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  keywords =     "practitioner knowledge; scholarship of teaching and
                 learning",
}

@Article{Sakhnini:2008:RAH,
  author =       "Victoria Sakhnini and Orit Hazzan",
  title =        "Reducing Abstraction in High School Computer Science
                 Education: {The} Case of Definition, Implementation,
                 and Use of Abstract Data Types",
  journal =      j-JERIC,
  volume =       "8",
  number =       "2",
  pages =        "5:1--5:??",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1362787.1362789",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:13:14 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "The research presented in this article deals with the
                 difficulties and mental processes involved in the
                 definition, implementation, and use of abstract data
                 types encountered by 12$^{th}$ grade advanced-level
                 computer science students. Research findings are
                 interpreted within the theoretical framework of
                 reducing abstraction [Hazzan 1999]. The article
                 describes the research setting and findings and
                 concludes with some pedagogical implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  keywords =     "abstract data types; abstraction; computer science
                 education; problem solving; reducing abstraction",
}

@Article{Zendler:2008:EFC,
  author =       "Andreas Zendler and Christian Spannagel",
  title =        "Empirical Foundation of Central Concepts for Computer
                 Science Education",
  journal =      j-JERIC,
  volume =       "8",
  number =       "2",
  pages =        "6:1--6:??",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1362787.1362790",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:13:14 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "The design of computer science curricula should rely
                 on central concepts of the discipline rather than on
                 technical short-term developments. Several authors have
                 proposed lists of basic concepts or fundamental ideas
                 in the past. However, these catalogs were based on
                 subjective decisions without any empirical support.
                 This article describes the empirical determination of
                 central concepts for computer science education.
                 Experts of computer science rated 49 concepts regarding
                 four criteria. The cluster analysis of the data
                 revealed the following central concepts: problem, data,
                 computer, test, algorithm, process, system,
                 information, language, communication, software,
                 program, computation, structure, and model.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  keywords =     "central concepts; fundamental ideas",
}

@Article{McCartney:2008:MIR,
  author =       "Robert McCartney and Josh Tenenberg",
  title =        "Making it Real",
  journal =      j-JERIC,
  volume =       "8",
  number =       "3",
  pages =        "7:1--7:??",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1404935.1404936",
  ISSN =         "1531-4278",
  bibdate =      "Fri Oct 10 12:52:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Some have proposed that realistic problem situations
                 are better for earning. This issue contains two
                 articles that examine the effects of ``making it real''
                 in computer architecture and human-computer
                 interaction.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  keywords =     "context; realism",
}

@Article{Tew:2008:CSL,
  author =       "Allison Elliott Tew and Brian Dorn and William D.
                 {Leahy, Jr.} and Mark Guzdial",
  title =        "Context as Support for Learning Computer
                 Organization",
  journal =      j-JERIC,
  volume =       "8",
  number =       "3",
  pages =        "8:1--8:??",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1404935.1404937",
  ISSN =         "1531-4278",
  bibdate =      "Fri Oct 10 12:52:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "The ubiquity of personal computational devices in the
                 lives of today's students presents a meaningful context
                 for courses in computer organization beyond the
                 general-purpose or imaginary processors routinely used.
                 This article presents results of a comparative study
                 examining student performance in a conventional
                 organization course and in one that has been
                 contextualized using a personal gaming platform as the
                 pedagogical architecture. We find minimal differences
                 in student learning but significant motivation and
                 engagement gains for those in the contextualized
                 course.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  keywords =     "computer organization; context; course design",
}

@Article{Yardi:2008:HAC,
  author =       "Sarita Yardi and Pamela Krolikowski and Taneshia
                 Marshall and Amy Bruckman",
  title =        "An {HCI} Approach to Computing in the Real World",
  journal =      j-JERIC,
  volume =       "8",
  number =       "3",
  pages =        "9:1--9:??",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1404935.1404938",
  ISSN =         "1531-4278",
  bibdate =      "Fri Oct 10 12:52:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "We describe the implementation of a six-week course to
                 teach Human-Computer Interaction (HCI) to high school
                 students. Our goal was to explore the potential of HCI
                 in motivating students to pursue future studies in
                 related computing fields. Participants in our course
                 learned to make connections between the types of
                 technology they use in their daily lives and the design
                 processes that went into creating these technologies.
                 We suggest that by portraying computing through the
                 lens of HCI, as an innovative, creative, and
                 challenging field with authentic, real-world
                 applications, we may be able to motivate students to
                 become more interested in computing.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  keywords =     "broadening participation in computing; education;
                 human-computer interaction; K-12 curriculum;
                 motivation",
}

@Article{Tenenberg:2009:APS,
  author =       "Josh Tenenberg and Robert McCartney",
  title =        "Answering Part of the Significant Question",
  journal =      j-JERIC,
  volume =       "8",
  number =       "4",
  pages =        "10:1--10:??",
  month =        jan,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1482348.1482349",
  ISSN =         "1531-4278",
  bibdate =      "Mon Feb 2 16:27:27 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Most scientific articles address particular questions
                 which are part of larger questions. The part-whole
                 relationship varies.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  keywords =     "Extension; prerequisite",
}

@Article{Armoni:2009:RCM,
  author =       "Michal Armoni",
  title =        "Reduction in {CS}: a (Mostly) Quantitative Analysis
                 of Reductive Solutions to Algorithmic Problems",
  journal =      j-JERIC,
  volume =       "8",
  number =       "4",
  pages =        "11:1--11:??",
  month =        jan,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1482348.1482350",
  ISSN =         "1531-4278",
  bibdate =      "Mon Feb 2 16:27:27 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "Reduction is a problem-solving strategy, relevant to
                 various areas of computer science, and strongly
                 connected to abstraction: a reductive solution
                 necessitates establishing a connection among problems
                 that may seem totally disconnected at first sight, and
                 abstracts the solution to the reduced-to problem by
                 encapsulating it as a black box. The study described in
                 this article continues a previous, qualitative study
                 that examined the ways undergraduate computer science
                 students perceive, experience, and use reduction as a
                 problem-solving strategy. The current study examines
                 the same issue, but in the context of a larger
                 population, using also quantitative analysis, and
                 focusing on algorithmic problems. The findings indicate
                 difficulties students have with the abstract
                 characteristics of reduction and with acknowledging
                 reduction as a general problem-solving strategy.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  keywords =     "black box; Reduction; reductive thinking",
}

@Article{Jayal:2009:PLA,
  author =       "Ambikesh Jayal and Martin Shepperd",
  title =        "The Problem of Labels in {E}-Assessment of Diagrams",
  journal =      j-JERIC,
  volume =       "8",
  number =       "4",
  pages =        "12:1--12:??",
  month =        jan,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1482348.1482351",
  ISSN =         "1531-4278",
  bibdate =      "Mon Feb 2 16:27:27 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "In this article we explore a problematic aspect of
                 automated assessment of diagrams. Diagrams have partial
                 and sometimes inconsistent semantics. Typically much of
                 the meaning of a diagram resides in the labels;
                 however, the choice of labeling is largely
                 unrestricted. This means a correct solution may utilize
                 differing yet semantically equivalent labels to the
                 specimen solution. With human marking this problem can
                 be easily overcome. Unfortunately with e-assessment
                 this is challenging. We empirically explore the scale
                 of the problem of synonyms by analyzing 160 student
                 solutions to a UML task. From this we find that
                 cumulative growth of synonyms only shows a limited
                 tendency to reduce at the margin despite using a range
                 of text processing algorithms such as stemming and
                 auto-correction of spelling errors. This finding has
                 significant implications for the ease in which we may
                 develop future e-assessment systems of diagrams, in
                 that the need for better algorithms for assessing label
                 semantic similarity becomes inescapable.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  keywords =     "diagrams; E-assessment",
}