%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.14", %%% date = "14 October 2017", %%% time = "08:50:10 MDT", %%% filename = "jeric.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "42919 3290 14268 139411", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; ACM Journal on %%% Educational Resources in Computing (JERIC)", %%% license = "public domain", %%% supported = "no", %%% docstring = "This is a COMPLETE BibTeX bibliography for %%% the electronic journal ACM Journal on %%% Educational Resources in Computing (JERIC) %%% (CODEN unknown, ISSN 1531-4278), for %%% 2001--date. %%% %%% Publication began with volume 1, number 1, in %%% March 2001. The journal appeared quarterly %%% in volumes 1 and 2, and bimonthly since then. %%% Publication ceased in 2009 with volume 8, %%% number 4. The journal now appears under a %%% new name, ACM Transactions on Computing %%% Education (TOCE), which is covered in a %%% companion bibliography file, toce.bib. %%% %%% The journal has a World-Wide Web site at: %%% %%% http://www.acm.org/pubs/jeric %%% http://portal.acm.org/browse_dl.cfm?idx=J814 %%% %%% Tables-of-contents of all issues are %%% available at: %%% %%% http://www.acm.org/pubs/contents/journals/jeric/ %%% %%% Qualified subscribers can retrieve the full %%% text of recent articles in PDF form. %%% %%% At version 1.14, the COMPLETE journal %%% coverage looked like this: %%% %%% 2001 ( 23) 2004 ( 10) 2007 ( 7) %%% 2002 ( 17) 2005 ( 24) 2008 ( 15) %%% 2003 ( 8) 2006 ( 17) 2009 ( 3) %%% %%% Article: 124 %%% %%% Total entries: 124 %%% %%% Data for this bibliography was derived from %%% data at the ACM Web site. %%% %%% ACM copyrights explicitly permit abstracting %%% with credit, so article abstracts, keywords, %%% and subject classifications have been %%% included in this bibliography wherever %%% available. %%% %%% The bibsource keys in the bibliography %%% entries below indicate the data sources. %%% %%% URL keys in the bibliography point to %%% World Wide Web locations of additional %%% information about the entry. %%% %%% Spelling has been verified with the UNIX %%% spell and GNU ispell programs using the %%% exception dictionary stored in the %%% companion file with extension .sok. %%% %%% BibTeX citation tags are uniformly chosen %%% as name:year:abbrev, where name is the %%% family name of the first author or editor, %%% year is a 4-digit number, and abbrev is a %%% 3-letter condensation of important title %%% words. Citation tags were automatically %%% generated by software developed for the %%% BibNet Project. %%% %%% In this bibliography, entries are sorted in %%% publication order, using ``bibsort -byvolume.'' %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{"\input bibnames.sty" # "\ifx \undefined \circled \def \circled #1{(#1)}\fi" # "\ifx \undefined \reg \def \reg {\circled{R}}\fi" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-JERIC = "ACM Journal on Educational Resources in Computing (JERIC)"} %%% ==================================================================== %%% Bibliography entries: @Article{Burger:2001:FST, author = "C. Burger and K. Rothermel", title = "A framework to support teaching in distributed systems", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "3", } @Article{Cassel:2001:EIA, author = "Lillian N. Cassel and Edward A. Fox", title = "Editorial: introducing the {ACM Journal on Resources in Computing}", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "1", } @Article{Fischer:2001:CES, author = "Stephan Fischer", title = "Course and exercise sequencing using metadata in adaptive hypermedia learning systems", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "5", } @Article{Heller:2001:GGE, author = "R. S. Heller", title = "Greetings from the {Guest Editor}", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "2", } @Article{Heller:2001:UTM, author = "Rachelle S. Heller and C. Dianne Martin and Nuzi Haneef and Sonja Gievska-Krliu", title = "Using a theoretical multimedia taxonomy framework", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "6", } @Article{Leidig:2001:LTO, author = "Torsten Leidig", title = "{L3}{---}towards an open learning environment", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "7", } @Article{Maly:2001:IHJ, author = "R. Maly and H. Abdel-Wahab and C. Wild and C. M. Overstreet and A. Gupta and A. Abdel-Hamid and S. Ghanem and A. Gonzalez and X. Zhu", title = "{IRI-h}, a {Java-based} distance education system: architecture and performance", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "8", } @Article{Saddik:2001:RAI, author = "Abdulmotaleb El Saddik and Stephan Fischer and Ralf Steinmetz", title = "Reusability and adaptability of interactive resources in {Web-based} educational systems", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "4", } @Article{Shirmohammadi:2001:WBM, author = "Shervin Shirmohammadi and Abdulmotaleb El Saddik and Nicolas D. Georganas and Ralf Steinmetz", title = "{Web}-based multimedia tools for sharing educational resources", journal = j-JERIC, volume = "1", number = "1es", pages = "??--??", month = mar, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "9", } @Article{Balci:2001:AAL, author = "Osman Balci and William S. Gilley and Robin J. Adams and Emre Tunar and N. Dwight Barnette", title = "Animations to Assist Learning Some Key Computer Science Topics", journal = j-JERIC, volume = "1", number = "2es", pages = "??--??", month = "Summer", year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "5", } @Article{Ben-Ari:2001:IED, author = "Mordechai Ben-Ari", title = "Interactive execution of distributed algorithms", journal = j-JERIC, volume = "1", number = "2es", pages = "??--??", month = "Summer", year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "2", } @Article{Anido-Rifon:2001:SSI, author = "L. Anido-Rif{\'o}n and M. J. Fern{\'a}ndez-Iglesias and M. Llamas-Nistal and M. Caeiro-Rodr{\'\i}guez and J. Santos-Gago and J. S. Rodr{\'\i}guez-Est{\'e}vez", title = "A component model for standardized {Web}-based education", journal = j-JERIC, volume = "1", number = "2es", pages = "??--??", month = "Summer", year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "1", } @Article{Hampel:2001:SSI, author = "Thorsten Hampel and Reinhard Keil-Slawik", title = "{sTeam}: structuring information in team-distributed knowledge management in cooperative learning environments", journal = j-JERIC, volume = "1", number = "2es", pages = "??--??", month = "Summer", year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "3", } @Article{Shang:2001:IDE, author = "Yi Shang and Hongchi Shi and Su-Shing Chen", title = "An intelligent distributed environment for active learning", journal = j-JERIC, volume = "1", number = "2es", pages = "??--??", month = "Summer", year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "4", } @Article{JTFCC:2001:CC, author = "{The Joint Task Force on Computing Curricula}", title = "Computing curricula 2001", journal = j-JERIC, volume = "1", number = "3es", pages = "??--??", month = "Fall", year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:36 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "1", } @Article{Yurcik:2001:E, author = "William Yurcik", title = "Editorial", journal = j-JERIC, volume = "1", number = "4", pages = "1--3", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Decker:2001:PMS, author = "Rick Decker and Stuart Hirshfield", title = "The {PIPPIN} machine: simulations of language processing", journal = j-JERIC, volume = "1", number = "4", pages = "4--17", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Menczer:2001:OTR, author = "Filippo Menczer and Alberto Maria Segre", title = "{OAMulator}: a teaching resource to introduce computer architecture concepts", journal = j-JERIC, volume = "1", number = "4", pages = "18--30", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Braught:2001:KSC, author = "Grant Braught and David Reed", title = "The knob \& switch computer: a computer architecture simulator for introductory computer science", journal = j-JERIC, volume = "1", number = "4", pages = "31--45", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Skrien:2001:CST, author = "Dale Skrien", title = "{CPU Sim 3.1}: a tool for simulating computer architectures for computer organization classes", journal = j-JERIC, volume = "1", number = "4", pages = "46--59", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://www.cs.colby.edu/djskrien/CPUSim", lastaccessed = "17 November 2012", acknowledgement = ack-nhfb, } @Article{Yehezkel:2001:TST, author = "Cecile Yehezkel and William Yurcik and Murray Pearson and Dean Armstrong", title = "Three simulator tools for teaching computer architecture: {Little Man} computer, and {RTLSim}", journal = j-JERIC, volume = "1", number = "4", pages = "60--80", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Osborne:2001:PC, author = "Hugh Osborne", title = "The {Postroom Computer}", journal = j-JERIC, volume = "1", number = "4", pages = "81--110", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Wainer:2001:UAS, author = "Gabriel A. Wainer and Sergio Daicz and Luis F. De Simoni and Demian Wassermann", title = "Using the {Alfa-1} simulated processor for educational purposes", journal = j-JERIC, volume = "1", number = "4", pages = "111--151", month = dec, year = "2001", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Yurcik:2002:SIS, author = "William (Bill) Yurcik", title = "Special issue on {\em specialized\/} computer architecture simulators that see the present and may hold the future", journal = j-JERIC, volume = "2", number = "1", pages = "1--3", month = mar, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Burch:2002:LGS, author = "Carl Burch", title = "{Logisim}: a graphical system for logic circuit design and simulation", journal = j-JERIC, volume = "2", number = "1", pages = "5--16", month = mar, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Shelburne:2002:PEP, author = "Brian J. Shelburne", title = "A {PDP-8} emulator program", journal = j-JERIC, volume = "2", number = "1", pages = "17--47", month = mar, year = "2002", CODEN = "????", DOI = "https://doi.org/10.1145/545197.545200", ISSN = "1531-4278", bibdate = "Thu Aug 07 17:10:23 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "The clean, simple, and elegant architecture of the classic PDP-8 makes it an ideal candidate for studying concepts in computer organization. The PDP-8 emulator program allows a user to write, edit, assemble, debug, trace, and execute PDP-8 machine code and PDP-8 assembler language programs. With it, the user can obtain a feel for the PDP-8. The PDP-8 emulator program includes a simple built-in text editor which is used to write and edit PDP-8 assembler language programs, an assembler to translate these programs into PDP-8 machine code, and a virtual PDP-8 engine upon which to execute the code. PDP-8 code can be executed from a debug screen display that allows the user to observe the contents of registers and memory as the code executes or code can be executed using an I/O interface that requires user-written PDP-8 I/O routines. This article provides an introduction to both the PDP-8 architecture and PDP-8 assembler language and discusses how to use the PDP-8 emulator program. The PDP-8 emulator program runs under MS-DOS in a command window.", acknowledgement = ack-nhfb, keywords = "virtual machine", } @Article{Dugan:2002:SIS, author = "B. Dugan and J. Zahorjan", title = "The {Sloop ISA} and the {SMOK} toolkit", journal = j-JERIC, volume = "2", number = "1", pages = "49--71", month = mar, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Moure:2002:KS, author = "J. C. Moure and Dolores I. Rexachs and Emilio Luque", title = "The {KScalar} simulator", journal = j-JERIC, volume = "2", number = "1", pages = "73--116", month = mar, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Roblitz:2002:LSE, author = "Thomas R{\"o}blitz and Frank Mueller and Oliver B{\"u}hn", title = "{LegoSim}: simulation of embedded kernels over {Pthreads}", journal = j-JERIC, volume = "2", number = "1", pages = "117--130", month = mar, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Hoganson:2002:HPC, author = "Kenneth E. Hoganson", title = "High-performance computer architecture and algorithm simulator", journal = j-JERIC, volume = "2", number = "1", pages = "131--148", month = mar, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Brady:2002:JPB, author = "Alyce Brady and R. C. McDowell and Kelly Schultz", title = "{JavaScript} programming basics: a laboratory series for beginning programmers", journal = j-JERIC, volume = "2", number = "2", pages = "1--1", month = jun, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Carlisle:2002:RI, author = "Martin C. Carlisle and Keith Shomper", title = "{ROBOT} interpreter", journal = j-JERIC, volume = "2", number = "2", pages = "2--2", month = jun, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Fagin:2002:AMU, author = "Barry Fagin", title = "{Ada\slash Mindstorms 2.0} user's guide and reference manual", journal = j-JERIC, volume = "2", number = "2", pages = "3--3", month = jun, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Ginat:2002:EBP, author = "David Ginat", title = "Effective binary perspectives in algorithmic problem solving", journal = j-JERIC, volume = "2", number = "2", pages = "4--4", month = jun, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Conn:2002:IPV, author = "Richard Conn", title = "Introduction to programming with {Visual Basic}", journal = j-JERIC, volume = "2", number = "3", pages = "1--1", month = sep, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Humphries:2002:IC, author = "Jeffrey W. Humphries and Martin C. Carlisle", title = "Introduction to {Cryptography}", journal = j-JERIC, volume = "2", number = "3", pages = "2--2", month = sep, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Conn:2002:SSR, author = "Richard Conn", title = "Software Systems Requirements", journal = j-JERIC, volume = "2", number = "4", pages = "1--1", month = dec, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Fagin:2002:QAE, author = "Barry S. Fagin and Laurence Merkle", title = "Quantitative analysis of the effects of robots on introductory {Computer Science} education", journal = j-JERIC, volume = "2", number = "4", pages = "1--17", month = dec, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Griswold:2002:TSE, author = "William G. Griswold", title = "Teaching Software Engineering in a Compiler Project Course", journal = j-JERIC, volume = "2", number = "4", pages = "1--18", month = dec, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Joy:2002:IWB, author = "Mike Joy and Boris Muzykantskii and Simon Rawles and Michael Evans", title = "An Infrastructure for {Web}-Based Computer-Assisted Learning", journal = j-JERIC, volume = "2", number = "4", pages = "1--19", month = dec, year = "2002", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Gilder:2003:VTS, author = "Jason Gilder and Michael Peterson and Jason Wright and Travis Doom", title = "A versatile tool for student projects: an {ASM} programming language for the {Lego} mindstorm", journal = j-JERIC, volume = "3", number = "1", pages = "1--14", month = mar, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Silva:2003:WTU, author = "Elaine Silva and Dilvan Moriera", title = "{WebCoM}: a tool to use peer review to improve student interaction", journal = j-JERIC, volume = "3", number = "1", pages = "1--14", month = mar, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Carr:2003:TPT, author = "Steve Carr and Jean Mayo and Ching-Kuang Shene", title = "{ThreadMentor}: a pedagogical tool for multithreaded programming", journal = j-JERIC, volume = "3", number = "1", pages = "1--30", month = mar, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Feb 3 18:43:37 MST 2004", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Holliday:2003:ACN, author = "Mark A. Holliday", title = "Animation of computer networking concepts", journal = j-JERIC, volume = "3", number = "2", pages = "1--26", month = jun, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:40 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Null:2003:MMC, author = "Linda Null and Julia Lobur", title = "{MarieSim}: {The} {MARIE} computer simulator", journal = j-JERIC, volume = "3", number = "2", pages = "1--29", month = jun, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:40 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Chau:2003:TKT, author = "Michael Chau and Zan Huang and Hsinchun Chen", title = "Teaching key topics in computer science and information systems through a {Web} search engine project", journal = j-JERIC, volume = "3", number = "3", pages = "1--14", month = sep, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:41 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Edwards:2003:ISP, author = "Stephen H. Edwards", title = "Improving student performance by evaluating how well students test their own programs", journal = j-JERIC, volume = "3", number = "3", pages = "1--24", month = sep, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:41 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Blank:2003:PPB, author = "Douglas Blank and Deepak Kumar and Lisa Meeden and Holly Yanco", title = "{Pyro}: a {Python}-based versatile programming environment for teaching robotics", journal = j-JERIC, volume = "3", number = "4", pages = "1--15", month = dec, year = "2003", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:41 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Bair:2005:SIG, author = "Bettina Bair and J. McGrath Cohoon", title = "Special issue on gender-balancing computing education", journal = j-JERIC, volume = "4", number = "1", pages = "1--1", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:42 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Werner:2005:PPH, author = "Linda L. Werner and Brian Hanks and Charlie McDowell", title = "Pair-programming helps female computer science students", journal = j-JERIC, volume = "4", number = "1", pages = "1--8", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:42 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{McKenna:2005:GBB, author = "Peter McKenna", title = "Gender and black boxes in the programming curriculum", journal = j-JERIC, volume = "4", number = "1", pages = "1--12", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:42 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Lester:2005:CGP, author = "Cynthia Y. Lester and Marcus Brown", title = "Creating gender parity: an instruction aide's influence", journal = j-JERIC, volume = "4", number = "1", pages = "1--14", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:42 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Berenson:2005:VWS, author = "Sarah B. Berenson and Kelli M. Slaten and Laurie Williams and Chih-Wei Ho", title = "Voices of women in a software engineering course: reflections on collaboration", journal = j-JERIC, volume = "4", number = "1", pages = "1--18", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:42 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Garvin-Doxas:2005:CCS, author = "Kathy Garvin-Doxas and Lecia J. Barker", title = "Communication in computer science classrooms: understanding defensive climates as a means of creating supportive behaviors", journal = j-JERIC, volume = "4", number = "1", pages = "1--18", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Tue Apr 26 17:40:42 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Kumar:2004:ISIa, author = "Deepak Kumar", title = "Introduction to special issue on robotics in undergraduate education", journal = j-JERIC, volume = "4", number = "2", pages = "1--1", month = jun, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Thu Jul 7 12:24:09 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, remark = "Although this issue is dated June 2004, it was not published until July 2005.", } @Article{Verner:2004:RCL, author = "Igor M. Verner and David J. Ahlgren", title = "Robot contest as a laboratory for experiential engineering education", journal = j-JERIC, volume = "4", number = "2", pages = "2--2", month = jun, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Thu Jul 7 12:24:09 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Kitts:2004:IFR, author = "Christopher Kitts and Neil Quinn", title = "An interdisciplinary field robotics program for undergraduate computer science and engineering education", journal = j-JERIC, volume = "4", number = "2", pages = "3--3", month = jun, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Thu Jul 7 12:24:09 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Sklar:2004:URU, author = "Elizabeth Sklar and Simon Parsons and Peter Stone", title = "Using {RoboCup} in university-level computer science education", journal = j-JERIC, volume = "4", number = "2", pages = "4--4", month = jun, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Thu Jul 7 12:24:09 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Kumar:2004:ISIb, author = "Deepak Kumar", title = "Introduction to special issue on robotics in undergraduate education", journal = j-JERIC, volume = "4", number = "3", pages = "1--1", month = sep, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Sat Sep 17 14:21:54 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Imberman:2004:IAA, author = "Susan P. Imberman", title = "An intelligent agent approach for teaching neural networks using {LEGO\reg{}} handy board robots", journal = j-JERIC, volume = "4", number = "3", pages = "1--12", month = sep, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Sat Sep 17 14:21:54 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Blank:2004:PPB, author = "Douglas Blank and Deepak Kumar and Lisa Meeden and Holly Yanco", title = "{Pyro}: a python-based versatile programming environment for teaching robotics", journal = j-JERIC, volume = "4", number = "3", pages = "1--15", month = sep, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Sat Sep 17 14:21:54 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Kumar:2004:TYU, author = "Amruth N. Kumar", title = "Three years of using robots in an artificial intelligence course: lessons learned", journal = j-JERIC, volume = "4", number = "3", pages = "1--15", month = sep, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Sat Sep 17 14:21:54 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{White:2004:SBN, author = "Daniel R. White and Mike S. Joy", title = "Sentence-based natural language plagiarism detection", journal = j-JERIC, volume = "4", number = "4", pages = "1--20", month = dec, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Sat Sep 17 14:21:54 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Diwan:2004:PDS, author = "Amer Diwan and William M. Waite and Michele H. Jackson and Jacob Dickerson", title = "{PL-detective}: a system for teaching programming language concepts", journal = j-JERIC, volume = "4", number = "4", pages = "1--22", month = dec, year = "2004", CODEN = "????", ISSN = "1531-4278", bibdate = "Sat Sep 17 14:21:54 MDT 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Kuban:2005:CMP, author = "Paul A. Kuban and Rammohan K. Ragade", title = "The {CAN} microcluster: {Parallel} processing over the controller area network", journal = j-JERIC, volume = "5", number = "1", pages = "1--12", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Nov 23 05:13:45 MST 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Feldman:2005:TQO, author = "Yishai A. Feldman", title = "Teaching quality object-oriented programming", journal = j-JERIC, volume = "5", number = "1", pages = "1--16", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Nov 23 05:13:45 MST 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Carroll:2005:CLT, author = "John M. Carroll and Mary Beth Rosson", title = "A case library for teaching usability engineering: {Design} rationale, development, and classroom experience", journal = j-JERIC, volume = "5", number = "1", pages = "1--22", month = mar, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Nov 23 05:13:45 MST 2005", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Sutner:2005:CTD, author = "Klaus Sutner", title = "{CDM}: {Teaching} discrete mathematics to computer science majors", journal = j-JERIC, volume = "5", number = "2", pages = "1--11", month = jun, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Aug 23 12:04:05 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Cigas:2005:TPA, author = "John Cigas and Wen-Jung Hsin", title = "Teaching proofs and algorithms in discrete mathematics with online visual logic puzzles", journal = j-JERIC, volume = "5", number = "2", pages = "1--12", month = jun, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Aug 23 12:04:05 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Harvey:2005:ESI, author = "Valerie J. Harvey and Susan H. Rodger", title = "Editorial for the special issue on software support for teaching discrete mathematics", journal = j-JERIC, volume = "5", number = "2", pages = "1--16", month = jun, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Aug 23 12:04:05 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Cogliati:2005:RPV, author = "Joshua J. Cogliati and Frances W. Goosey and Michael T. Grinder and Bradley A. Pascoe and Rockford J. ROSS and Cheston J. Williams", title = "Realizing the promise of visualization in the theory of computing", journal = j-JERIC, volume = "5", number = "2", pages = "1--17", month = jun, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Aug 23 12:04:05 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } @Article{Gegg-Harrison:2005:CCM, author = "Timothy S. Gegg-Harrison", title = "Constructing contracts: {Making} discrete mathematics relevant to beginning programmers", journal = j-JERIC, volume = "5", number = "2", pages = "1--28", month = jun, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Aug 23 12:04:05 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, } %%% TO DO: Are page numbers available for v5 n3? @Article{Brusilovsky:2005:IES, author = "Peter Brusilovsky and Sergey Sosnovsky", title = "Individualized exercises for self-assessment of programming knowledge: {An} evaluation of {QuizPACK}", journal = j-JERIC, volume = "5", number = "3", pages = "??--??", month = sep, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Sep 27 05:45:30 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "6", } @Article{Brusilovsky:2005:PSI, author = "Peter Brusilovsky and Colin Higgins", title = "Preface to the special issue on automated assessment of programming assignments", journal = j-JERIC, volume = "5", number = "3", pages = "??--??", month = sep, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Sep 27 05:45:30 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "1", } @Article{Douce:2005:ATB, author = "Christopher Douce and David Livingstone and James Orwell", title = "Automatic test-based assessment of programming: a review", journal = j-JERIC, volume = "5", number = "3", pages = "??--??", month = sep, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Sep 27 05:45:30 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "4", } @Article{Higgins:2005:AAE, author = "Colin A. Higgins and Geoffrey Gray and Pavlos Symeonidis and Athanasios Tsintsifas", title = "Automated assessment and experiences of teaching programming", journal = j-JERIC, volume = "5", number = "3", pages = "??--??", month = sep, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Sep 27 05:45:30 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "5", } @Article{Joy:2005:BOS, author = "Mike Joy and Nathan Griffiths and Russell Boyatt", title = "The boss online submission and assessment system", journal = j-JERIC, volume = "5", number = "3", pages = "??--??", month = sep, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Sep 27 05:45:30 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "2", } @Article{Kumar:2005:GPA, author = "Amruth N. Kumar", title = "Generation of problems, answers, grade, and feedback---case study of a fully automated tutor", journal = j-JERIC, volume = "5", number = "3", pages = "??--??", month = sep, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Sep 27 05:45:30 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "3", } @Article{Malmi:2005:EAA, author = "Lauri Malmi and Ville Karavirta and Ari Korhonen and Jussi Nikander", title = "Experiences on automatically assessed algorithm simulation exercises with different resubmission policies", journal = j-JERIC, volume = "5", number = "3", pages = "??--??", month = sep, year = "2005", CODEN = "????", ISSN = "1531-4278", bibdate = "Wed Sep 27 05:45:30 MDT 2006", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "7", } @Article{Turner:2005:MMA, author = "Scott A. Turner and Manuel A. P{\'e}rez-Qui{\~n}ones and Stephen H. Edwards", title = "{minimUML}: a minimalist approach to {UML} diagramming for early computer science education", journal = j-JERIC, volume = "5", number = "4", pages = "1:1--1:??", month = dec, year = "2005", CODEN = "????", DOI = "https://doi.org/10.1145/1186639.1186640", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:03 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "In introductory computer science courses, the Unified Modeling Language (UML) is commonly used to teach basic object-oriented design. However, there appears to be a lack of suitable software to support this task. Many of the available programs that support UML focus on developing code and not on enhancing learning. Programs designed for educational use sometimes have poor interfaces or are missing common and important features such as multiple selection and undo/redo. Hence the need for software that is tailored to an instructional environment and that has all the useful and needed functionality for that specific task. This is the purpose of minimUML. It provides a minimum amount of UML, just what is commonly used in beginning programming classes, and a simple, usable interface. In particular, minimUML is designed to support abstract design while supplying features for exploratory learning and error avoidance. It supports functionality that includes multiple selection, undo/redo, flexible printing, cut and paste, and drag and drop. In addition, it allows for the annotation of diagrams, through text or free-form drawings, so students can receive feedback on their work. minimUML was developed with the goals of supporting ease of use, of supporting novice students, and of requiring no prior training for its use. This article presents the rationale behind the minimUML design, a description of the tool, and the results of usability evaluations and student feedback on the use of the tool.", acknowledgement = ack-nhfb, articleno = "1", keywords = "education; human-computer interaction; learning; minimalist design; UML", } @Article{Soh:2005:FCC, author = "Leen-Kiat Soh and Ashok Samal and Gwen Nugent", title = "A framework for {CS1} closed laboratories", journal = j-JERIC, volume = "5", number = "4", pages = "2:1--2:??", month = dec, year = "2005", CODEN = "????", DOI = "https://doi.org/10.1145/1186639.1186641", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:03 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Closed laboratories are becoming an increasingly popular approach to teaching introductory computer science courses, as they facilitate structured problem-solving and cooperation. However, most closed laboratories have been designed and implemented without embedded instructional research components for constant evaluation of the laboratories' effectiveness. As a result, it is not convenient to maintain and improve the laboratories over time so that they adapt to changing CS topics, curricula, and student needs. This article reports on an integrated framework for designing, implementing, and maintaining laboratories with embedded instructional research design. Although the activities reported here are part of our department-wide effort to cover CS0, CS1, and CS2, we focus here on the design and implementation of the labs for CS1.", acknowledgement = ack-nhfb, articleno = "2", keywords = "closed laboratories; cooperative learning; instructional design", } @Article{Grimes:2005:CGI, author = "Douglas Grimes and Mark Warschauer and Tara Hutchinson and Falko Kuester", title = "Computer graphics instruction in {VizClass}", journal = j-JERIC, volume = "5", number = "4", pages = "3:1--3:??", month = dec, year = "2005", CODEN = "????", DOI = "https://doi.org/10.1145/1186639.1186642", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:03 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "VizClass is a university classroom environment designed to offer students in computer graphics and engineering courses up-to-date visualization technologies. Three digital whiteboards and a three-dimensional stereoscopic display provide complementary display surfaces. Input devices include touchscreens on the digital whiteboards, remote keyboards, data gloves, and hand-position sensors. We use observations, interviews, and surveys to examine the pedagogical impacts of VizClass for teaching and learning computer graphics and virtual reality. Preliminary findings include positive student and teacher attitudes and greater learner engagement in after-class collaborations.", acknowledgement = ack-nhfb, articleno = "3", keywords = "engagement; graphics programming; visualization classroom; visualization environment; VizClass", } @Article{Roy:2006:DEP, author = "Geoffrey G. Roy", title = "Designing and explaining programs with a literate pseudocode", journal = j-JERIC, volume = "6", number = "1", pages = "1:1--1:??", month = mar, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1217862.1217863", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:12 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Designing and explaining programs are often difficult tasks, especially when novices are involved. It also concerns more experienced programmers when complex algorithms need to be carefully explained and documented as part of software development. Good practice suggests that code and documentation be tightly coupled; but there are only a few support tools specifically targeted at novices that require this as an integral part of the programming process. We propose a new tool design with this objective in mind: P-Coder gives a flexible descriptive view of the program via pseudocode notation within a graphical tree-structured model, from which the complete algorithm can be specified to retain the informal description integrated with the final code. Thus the code meets some of the key requirements for realizing a literate program.", acknowledgement = ack-nhfb, articleno = "1", keywords = "literate programming; novices; pseudocode", } @Article{Marshall:2006:MDL, author = "Byron B. Marshall and Hsinchun Chen and Rao Shen and Edward A. Fox", title = "Moving digital libraries into the student learning space: {The} {GetSmart} experience", journal = j-JERIC, volume = "6", number = "1", pages = "2:1--2:??", month = mar, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1217862.1217864", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:12 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "The GetSmart system was built to support theoretically sound learning processes in a digital library environment by integrating course management, digital library, and concept mapping components to support a constructivist, six-step, information search process. In the fall of 2002 more than 100 students created 1400 concept maps as part of selected computing classes offered at the University of Arizona and Virginia Tech. Those students conducted searches, obtained course information, created concept maps, collaborated in acquiring knowledge, and presented their knowledge representations. This article connects the design elements of the GetSmart system to targeted concept-map-based learning processes, describes our system and research testbed, and analyzes our system usage logs. Results suggest that students did in fact use the tools in an integrated fashion, combining knowledge representation and search activities. After concept mapping was included in the curriculum, we observed improvement in students' online quiz scores. Further, we observed that students in groups collaboratively constructed concept maps with multiple group members viewing and updating map details.", acknowledgement = ack-nhfb, articleno = "2", keywords = "concept maps; digital libraries; education", } @Article{Teo:2006:KDM, author = "Chao Boon Teo and Robert Kheng Leng Gay", title = "A knowledge-driven model to personalize e-learning", journal = j-JERIC, volume = "6", number = "1", pages = "3:1--3:??", month = mar, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1217862.1217865", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:12 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This article highlights basic issues that have hindered e-learning systems from becoming the revolutionary force it could be for education. While current systems aim to foster significant improvements in learning, this article argues that most systems are still limited to just being online repositories. This and the lack of learning personalization has become a topic for research. A knowledge-driven model to personalize e-learning is proposed in this article. A novel methodology for eliciting and personalizing tacit knowledge is presented. We focus on describing the complex information processing in terms of knowledge, rather than the details of its implementation.", acknowledgement = ack-nhfb, articleno = "3", keywords = "concept map; distance learning; e-learning; instructional design; knowledge management", } @Article{Koldehofe:2006:LEE, author = "Boris Koldehofe and Marina Papatriantafilou and Philippas Tsigas", title = "{LYDIAN}: {An} extensible educational animation environment for distributed algorithms", journal = j-JERIC, volume = "6", number = "2", pages = "1:1--1:??", month = jun, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1236201.1236202", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:19 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "LYDIAN is an environment to support the teaching and learning of distributed algorithms. It provides a collection of distributed algorithms as well as continuous animations. Users can combine algorithms and animations with arbitrary network structures defining the interconnection and behavior of the distributed algorithm. Further, it facilitates the creation of algorithm descriptions as well as the creation of network structures. This makes LYDIAN a flexible tool to be used with students with different skills and backgrounds. This article gives an overview about various ideas and concepts behind LYDIAN by describing in detail the framework for an educational visualization and simulation environment for learning/teaching distributed algorithms as well as discussing possible extensions, which may improve possibilities for user interaction. Moreover, in our effort to understand better what visualization and simulation environments, such as LYDIAN, need to provide, we show results taken from a case study integrating LYDIAN in an undergraduate distributed-systems course.", acknowledgement = ack-nhfb, articleno = "1", keywords = "distributed algorithms", } @Article{Nutt:2006:ASC, author = "Gary Nutt", title = "Addressing small computers in the first {OS} course", journal = j-JERIC, volume = "6", number = "2", pages = "2:1--2:??", month = jun, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1236201.1236203", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:19 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Small computers are emerging as important components of the contemporary computing scene. Their operating systems vary from specialized software for an embedded system to the same style of OS used on a generic desktop or server computer. This article describes a course in which systems are classified by their hardware capability and the traditional OS topic areas are then dissected, augmented, reassembled, and reorganized to illustrate the aspects of each topic as applicable to each class of small computers. Ultimately, the course covers the same material as a conventional OS course, but from a new perspective.", acknowledgement = ack-nhfb, articleno = "2", keywords = "dedicated systems; embedded systems; managed processes; OS organization; small computers; trusted processes", } @Article{Frincke:2006:ESI, author = "D. Frincke and S. Oudekirk and B. Popovsky", title = "Editorial: {Special} issue on resources for the computer security and information assurance curriculum: {Issue 1}", journal = j-JERIC, volume = "6", number = "3", pages = "1:1--1:??", month = sep, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1243481.1243482", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:25 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This editorial introduces a set of articles in the JERIC special issue on resources for the computer security and information assurance curriculum. It begins with a discussion of why such a special edition is needed and continues by outlining the articles in this volume, as follows: an innovative model for security education based on teaching hospitals; teaching context in computer security through metaphors; tools supporting exploration of cryptography; suggestions for a hands-on Linux course geared towards a student population that includes noncomputer scientists; and finally, projects suitable for a course in computer forensics.", acknowledgement = ack-nhfb, articleno = "1", keywords = "computer forensics; protection; security", } @Article{Goel:2006:IMI, author = "Sanjay Goel and Damira Pon and Peter Bloniarz and Robert Bangert-Drowns and George Berg and Vince Delio and Laura Iwan and Thomas Hurbanek and Sandoor P. Schuman and Jagdish Gangolly and Adnan Baykal and Jon Hobbs", title = "Innovative model for information assurance curriculum: {A} teaching hospital", journal = j-JERIC, volume = "6", number = "3", pages = "2:1--2:??", month = sep, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1243481.1243483", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:25 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted into living-cases used for training and education of university students and public-sector employees. Such a model helps ensure that the curriculum stays current even as the field of information assurance continues to evolve. Solving industry problems hones research skills, while exposing students to living cases helps build context for concepts in information assurance. The success of this approach is contingent upon strong partnerships with government and private organizations that have real security issues as well as an active research program in information security that involves faculty and students. This article presents an implementation of this approach at CIFA. Development of the curriculum, observations gleaned through dissemination of the curriculum, and the infrastructure developed to support this concept are discussed. Evaluation of students has demonstrated the effectiveness of the ``teaching hospital'' concept and provided us with feedback to further refine its implementation.", acknowledgement = ack-nhfb, articleno = "2", keywords = "case-based learning; cases; constructivism; education; information assurance; information security education; learning; problem-based learning; teaching hospital", } @Article{Bishop:2006:TCI, author = "Matt Bishop", title = "Teaching context in information security", journal = j-JERIC, volume = "6", number = "3", pages = "3:1--3:??", month = sep, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1243481.1243484", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:25 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as other humanities, to force students to apply or derive principles of computer security in unusual and unexpected situations. Our experience shows that students find the process enjoyable, stimulating, and effective.", acknowledgement = ack-nhfb, articleno = "3", keywords = "computer security; environment; instruction; judgment", } @Article{Garcia-Pasquel:2006:GCT, author = "Jes{\'u}s Adolfo Garc{\'\i}a-Pasquel and Jos{\'e} Galaviz", title = "{Ganz{\'u}a}: a cryptanalysis tool for monoalphabetic and polyalphabetic ciphers", journal = j-JERIC, volume = "6", number = "3", pages = "4:1--4:??", month = sep, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1243481.1243485", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:25 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganz{\'u}a (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers. It can use almost arbitrary character sets for the plain and cipher alphabets as well as obtain the standard relative frequencies of many languages and provide other useful data.", acknowledgement = ack-nhfb, articleno = "4", keywords = "classical cryptography; cryptology", } @Article{Shumba:2006:THL, author = "Rose Shumba", title = "Teaching hands-on {Linux} host computer security", journal = j-JERIC, volume = "6", number = "3", pages = "5:1--5:??", month = sep, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1243481.1243486", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:25 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to develop the exercises, which have been successfully utilized since spring 2003 to teach cybersecurity basics classes. The experiences and challenges encountered in teaching the course and possible future work are also described.", acknowledgement = ack-nhfb, articleno = "5", keywords = "computer security; cryptography; file integrity; file permissions; host security exercises; user accounts", } @Article{Harrison:2006:TPC, author = "Warren Harrison", title = "A term project for a course on computer forensics", journal = j-JERIC, volume = "6", number = "3", pages = "6:1--6:??", month = sep, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1243481.1243487", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:25 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some key aspects of a digital investigation by overly focusing on the mechanics of retrieval. We recently developed a course on computer forensics that utilized a large-scale, team-based term project involving the forensics examination of a computer system. In this article we describe an approach for providing examination disks for student use in a term project that reinforces the investigative aspect of the process.", acknowledgement = ack-nhfb, articleno = "6", keywords = "computer crime; computer evidence; student projects", } @Article{Frincke:2006:ERC, author = "D. Frincke and S. Oudekirk and B. Popovsky", title = "Editorial: {Resources} for the computer security and information assurance curriculum", journal = j-JERIC, volume = "6", number = "4", pages = "1:1--1:??", month = dec, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1248453.1248454", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:35 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This editorial introduces the articles in this companion issue to the first JERIC special issue on Computer Security and Information Assurance Curriculum. It includes an article that supports making computer security education more accessible through a portable network, and one on lessons learned in developing a workshop for educators. Other articles outline laboratory exercises especially suitable for distance or online education, illustrate ways to teach students about threats, and provide approaches to classroom discussion of disaster recovery.", acknowledgement = ack-nhfb, articleno = "1", keywords = "computer forensics; protection; security", } @Article{Rosenberg:2006:TNR, author = "Timothy Rosenberg and Lance J. Hoffman", title = "Taking the network on the road: {Portable} network solutions for computer security educators", journal = j-JERIC, volume = "6", number = "4", pages = "2:1--2:??", month = dec, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1248453.1248455", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:35 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Educational institutions that wish to implement a specialized teaching laboratory often have a variety of obstacles to overcome. Some of these obstacles are related to adapting existing classroom infrastructure, building the laboratory, and meeting the demands for multiple-use classrooms to maximize the return on investment. In some cases, such as computer security, they must also maintain a controlled environment. Portable educational networks of computers allow teaching specialized topics that have heretofore required specialized laboratories in existing classrooms. Their flexibility allows them to be used for a variety of content---operating systems, networking, security, and forensics. These systems are in use today supporting undergraduate, graduate, and professional education.", acknowledgement = ack-nhfb, articleno = "2", keywords = "closed laboratories; computer security; cooperative learning; information assurance; information security; instructional design", } @Article{Wagner:2006:PCS, author = "Paul J. Wagner and Andrew T. Phillips", title = "A portable computer security workshop", journal = j-JERIC, volume = "6", number = "4", pages = "3:1--3:??", month = dec, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1248453.1248456", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:35 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles as well as an understanding of some of the significant tools and techniques in this area. Evaluations of the workshop have been very positive; we will offer the workshop locally, regionally, and nationally in the next year. The materials from this workshop are available at \url{http://clics.cs.uwec.edu/workshopmaterials.htm}.", acknowledgement = ack-nhfb, articleno = "3", keywords = "computer security; laboratory exercises; portable workshop", } @Article{Bhagyavati:2006:LEO, author = "Bhagyavati", title = "Laboratory exercises in online information assurance courses", journal = j-JERIC, volume = "6", number = "4", pages = "4:1--4:??", month = dec, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1248453.1248457", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:35 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three years. These assignments have proven successful in enhancing the learning experiences of undergraduate and graduate computer science students in introductory and advanced courses in the area of information assurance. Typical courses include introduction to computer networks, computer and network security, information assurance, network management, wireless networks and applications, computer forensics, and risk assessment.", acknowledgement = ack-nhfb, articleno = "4", keywords = "blended courses; hands-on; information assurance; infrastructure safeguards; network security; online learning", } @Article{Brustoloni:2006:LEN, author = "Jos{\'e} Carlos Brustoloni", title = "Laboratory experiments for network security instruction", journal = j-JERIC, volume = "6", number = "4", pages = "5:1--5:??", month = dec, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1248453.1248458", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:35 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an attack by the instructor. Students then learn how to use open-source defense tools appropriate for the role they are playing and the attack at hand. Threats covered include eavesdropping, dictionary, man-in-the-middle, port scanning, and fingerprinting attacks. Defense skills gained by students include how to forward ports with OpenSSH, how to prevent weak passwords with CrackLib, how to salt passwords, how to set up a simple certifying authority, issue and verify certificates, and guarantee communication confidentiality and integrity using OpenSSL, and how to set up firewalls and IPsec-based virtual private networks. At two separate offerings, tests taken before and after each experiment showed that each has a statistically significant and large effect on students' learning. Moreover, surveys show that students finish the sequence of experiments with high interest in further studies and work in the area of security. These results suggest that the experiments are well-suited for introductory security or networking courses.", acknowledgement = ack-nhfb, articleno = "5", keywords = "certificate; certifying authority; course; dictionary attack; eavesdropping; education; experiment; fingerprinting; firewall; IPsec; man-in-the-middle; password; port scanning; security; SSH; SSL; VPN", } @Article{Landry:2006:DCD, author = "Brett J. L. Landry and M. Scott Koger", title = "Dispelling 10 common disaster recovery myths: {Lessons} learned from {Hurricane Katrina} and other disasters", journal = j-JERIC, volume = "6", number = "4", pages = "6:1--6:??", month = dec, year = "2006", CODEN = "????", DOI = "https://doi.org/10.1145/1248453.1248459", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:35 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Disasters happen all the time; yet despite this, many organizations are caught unprepared or make unrealistic assumptions. These factors create environments that will fail during a disaster. Most information technology (IT) curricula do not cover disaster recovery (DR) plans and strategies in depth. The unfortunate result is that most new computer systems are implemented without sufficient disaster recovery plans and testing. Courses on network security need to examine DR as a real threat and cover it as a core module. By dispelling the 10 common myths, organizations can better plan, develop, and test true DR plans.", acknowledgement = ack-nhfb, articleno = "6", keywords = "backups; business continuity; disaster recovery; hardware failures; IT curricula; network attacks; software failures; viruses; worms", } @Article{McCartney:2007:ENV, author = "Robert McCartney and Josh Tenenberg", title = "From the editors: a new vision for {JERIC}", journal = j-JERIC, volume = "7", number = "1", pages = "1:1--1:??", month = mar, year = "2007", CODEN = "????", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:45 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "As the new Editors-in-Chief, we outline our vision for building JERIC to become the premier journal in computing education. Doing so will require authors who submit high-quality articles --- their ``best stuff'', reviewers who provide the feedback and guidance to ensure that each article embodies a scholarly approach to teaching and learning while being of practical use to the computing educator, and readers who read the articles, critically evaluate and discuss the findings with others, and adapt, adopt, and evaluate these findings in their own classrooms.", acknowledgement = ack-nhfb, articleno = "1", keywords = "manuscript review criteria; scholarship of teaching and learning", } @Article{Coelho:2007:CSD, author = "Wesley Coelho and Gail Murphy", title = "{ClassCompass}: a software design mentoring system", journal = j-JERIC, volume = "7", number = "1", pages = "2:1--2:??", month = mar, year = "2007", CODEN = "????", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:45 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Becoming a quality software developer requires practice under the guidance of an expert mentor. Unfortunately, in most academic environments, there are not enough experts to provide any significant design mentoring for software engineering students. To address this problem, we present a collaborative software design tool intended to maximize an instructor's ability to mentor a group of students. Students use the system to create software designs for a given set of requirements. While they work, students receive automated feedback regarding common design mistakes. The system then provides support and guidance for students to manually critique each other's work. Students can view and learn from the design approaches taken by other students, as well as the critiques associated with them. We have tried this approach in software engineering classes with some positive results. We believe that this collaborative and partially automated approach can significantly improve the quality of software design education when few mentors are available.", acknowledgement = ack-nhfb, articleno = "2", keywords = "collaborative education; design critiquing", } @Article{Hendry:2007:HPC, author = "David G. Hendry", title = "History places: a case study for relational database and information retrieval system design", journal = j-JERIC, volume = "7", number = "1", pages = "3:1--3:??", month = mar, year = "2007", CODEN = "????", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:45 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This article presents a project-based case study that was developed for students with diverse backgrounds and varied inclinations for engaging technical topics. The project, called History Places, requires that student teams develop a vision for a kind of digital library, propose a conceptual model, and use the model to derive a logical model and information retrieval specification. From these two design representations, students implement a data-driven Web site that enables users to browse content and search by exact and best-match queries. The project brief contains a set of general requirements that promote creative solutions, while also bounding the complexity of the solution space. The article includes teaching notes and a conceptual model, expressed as an enhanced entity-relationship model in UML. The model, consisting of approximately ten entities, contains binary, unary, ternary, and specialization/generalization relationships. The article concludes with some reflections based on the experiences of using this project in six classes over four years.", acknowledgement = ack-nhfb, articleno = "3", keywords = "case-based learning; conceptual modeling; database management systems; design; education; informatics; information retrieval; Lucene; PostgreSQL; UML", } @Article{Tenenberg:2007:CSL, author = "Josh Tenenberg and Robert McCartney", title = "Computer science in a liberal arts context", journal = j-JERIC, volume = "7", number = "2", pages = "1:1--1:??", month = jun, year = "2007", CODEN = "????", DOI = "https://doi.org/10.1145/1240200.1240201", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:52 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This issue is devoted to the curriculum guidelines from the Liberal Arts Computer Science Consortium. These guidelines provide a coherent and important model for computing education within a liberal arts context, giving primacy to critical reason, rigorous methods, and student engagement in the research process. In this regard, they are at the same time both conservative, by giving low priority to the latest technologies, and radical by resisting the managerial impulse that at its worst commodifies and devalues higher education.", acknowledgement = ack-nhfb, articleno = "1", keywords = "computing curriculum guidelines; LACS; liberal arts", } @Article{Consortium:2007:MCL, author = "Liberal Arts Computer Science Consortium", title = "A 2007 model curriculum for a liberal arts degree in computer science", journal = j-JERIC, volume = "7", number = "2", pages = "2:1--2:??", month = jun, year = "2007", CODEN = "????", DOI = "https://doi.org/10.1145/1240200.1240202", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:52 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", acknowledgement = ack-nhfb, articleno = "2", keywords = "computing curriculum guidelines; LACS; liberal arts", } @Article{McCartney:2007:WE, author = "Robert McCartney and Josh Tenenberg", title = "Why Evidence?", journal = j-JERIC, volume = "7", number = "3", pages = "1:1--1:??", month = nov, year = "2007", CODEN = "????", DOI = "https://doi.org/10.1145/1281320.1281321", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:56 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "A goal of JERIC is to support educational practice by publishing articles that are useful to classroom instructors. One way of ensuring this utility is to require that claims are backed up by evidence. This evidence allows the reader to evaluate the potential effectiveness and transferability of any approaches presented in these articles to their own courses and situations.", acknowledgement = ack-nhfb, articleno = "1", keywords = "evidence-based education", } @Article{Greitzer:2007:CSI, author = "Frank L. Greitzer and Olga Anna Kuchar and Kristy Huston", title = "Cognitive science implications for enhancing training effectiveness in a serious gaming context", journal = j-JERIC, volume = "7", number = "3", pages = "2:1--2:??", month = nov, year = "2007", CODEN = "????", DOI = "https://doi.org/10.1145/1281320.1281322", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:56 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate sound cognitive, learning, and pedagogical principles into their design and structure. In this paper, we review cognitive principles that can be applied to improve the training effectiveness in serious games and we describe a process we used to design improvements for an existing game-based training application in the domain of cyber security education.", acknowledgement = ack-nhfb, articleno = "2", keywords = "cognitive principles; computer-based training; cyber security education; serious gaming; training effectiveness", } @Article{Tenenberg:2008:LQE, author = "Josh Tenenberg and Robert McCartney", title = "Linking questions and evidence", journal = j-JERIC, volume = "7", number = "4", pages = "1:1--1:??", month = jan, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1316450.1316451", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:59 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This special issue features a set of papers recently published in the 3rd International Workshop on Computing Education Research (ICER'07). The papers were selected because they closely meet the publication criteria for ACM/JERIC: stemming from computing education practice, grounded in relevant literature, containing analysis of primary empirical data collected to support specific claims, and providing implications for practice. In addition, the diverse set of research methods used demonstrates how empirical methods can be chosen to serve the specific questions of interest, whether for purposes of research or for improvement of teaching practice. This set of papers can therefore serve as exemplars and resources for the educator wishing to develop a wider range of tools for probing issues of teaching and learning within the classroom.", acknowledgement = ack-nhfb, articleno = "1", keywords = "empirical methods; evidence; quasi-experiment; research methods", } @Article{Hanks:2008:PEN, author = "Brian Hanks", title = "Problems encountered by novice pair programmers", journal = j-JERIC, volume = "7", number = "4", pages = "2:1--2:??", month = jan, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1316450.1316451", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:59 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "In a study of the types of problems encountered by students that led them to seek assistance, Robins et al. [2006] found that the most common problems were related to trivial mechanics. The students in this study worked by themselves on their programming exercises. This article discusses a replication of the Robins et al. study in which the subjects pair programmed. The types of problems encountered by the pairing students were similar to those of the solo students. The number of problems requiring assistance was much smaller for the pairing students, which suggests that they were able to resolve more problems on their own.", acknowledgement = ack-nhfb, articleno = "2", keywords = "computer science education; CS1; errors; novice; pair programming", } @Article{Sajaniemi:2008:SDS, author = "Jorma Sajaniemi and Marja Kuittinen and Taina Tikansalo", title = "A study of the development of students' visualizations of program state during an elementary object-oriented programming course", journal = j-JERIC, volume = "7", number = "4", pages = "3:1--3:??", month = jan, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1316450.1316453", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:59 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Students' understanding of object-oriented (OO) program execution was studied by asking students to draw a picture of a program state at a specific moment. Students were given minimal instructions on what to include in their drawings in order to see what they considered to be central concepts and relationships in program execution. Three drawing tasks were given at different phases of an elementary OO programming course where two animation tools were used for program visualization. The drawings were analyzed for their overall approaches and their detailed contents.\par There was a large variability in the overall approaches and the popularity of various approaches changed during the course. The results indicate that students' mental representations of OO concepts and program execution not only grow as new material is covered in teaching, but they also change. The first drawings treat methods as having primarily a static existence; later methods are seen as dynamic invocations that call each other. The role of classes in program execution fluctuates during learning, indicating problems in locating the notion of class with respect to, for example, objects. Two major sources of problems that manifested in many different forms were the relationship between object and method, and the role of the main method with respect to program state. Other problems were caused by overly simplistic understanding of object identification and improper use of application domain knowledge.", acknowledgement = ack-nhfb, articleno = "3", keywords = "CS1/2; mental representation; object-oriented programming; program state; visualization", } @Article{Chinn:2008:USV, author = "Donald Chinn and Tammy Vandegrift", title = "Uncovering student values for hiring in the software industry", journal = j-JERIC, volume = "7", number = "4", pages = "4:1--4:??", month = jan, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1316450.1316454", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:59 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "This article provides an analysis of student responses to an exercise used in a computer ethics and a software engineering course to raise awareness of issues related to hiring, including issues of professional responsibility and diversity. Students from two different universities were asked to evaluate four candidates for two positions in a fictitious software company. They then developed a set of criteria for evaluation and constructed an argument to support their choices. After discussing their choice with others in the class, students could change their hiring decisions. Students' hiring criteria were coded using emergent categories, inferences in the arguments were coded according to the criteria, and reasons for changing hiring decisions were coded. Students considered criteria that fell into five areas: technical skills, soft skills, personal traits, previous employment, and career/job considerations. Reasons for changing hiring choices included previous experience, diversity considerations, people skills, leadership skills, and reaching consensus. The article also reports inferences students made about the job candidates.", acknowledgement = ack-nhfb, articleno = "4", keywords = "diversity; ethics; hiring criteria", } @Article{Simon:2008:FYS, author = "Beth Simon and Brian Hanks", title = "First-year students' impressions of pair programming in {CS1}", journal = j-JERIC, volume = "7", number = "4", pages = "5:1--5:??", month = jan, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1316450.1316455", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:59 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Pair programming, as part of the Agile Development process, has noted benefits in professional software development scenarios. These successes have led to a rise in use of pair programming in educational settings, particularly in Computer Science 1 (CS1). Specifically, McDowell et al. [2006] has shown that students using pair programming in CS1 do better in a CS2 class (with solo programming) than students who don't pair in CS1. This paper seeks to address a similar question, but from a qualitative, student-focused approach. How do students define, experience, and value the pair programming experience? How do they experience and value it compared to solo programming? Does pairing in CS1 impact their confidence in their abilities?\par We report on semi-structured interviews with 11 subjects from two institutions where pair programming was used in CS1, and solo programming was used in the CS2. Many of the responses met our expectations; students get stuck less and explore more ideas while pairing, and believe that pair programming helped them in CS1. Other responses were more surprising. Students reported that when solo programming they were more confident and understood their programs better. Many students also said that they started work on their assignments earlier when soloing. Students also continue to use other students as resources even when working 'solo.'", acknowledgement = ack-nhfb, articleno = "5", keywords = "CS1; debugging; interview; novice; pair programming; qualitative", } @Article{Yarosh:2008:NDS, author = "Svetlana Yarosh and Mark Guzdial", title = "Narrating data structures: {The} role of context in {CS2}", journal = j-JERIC, volume = "7", number = "4", pages = "6:1--6:??", month = jan, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1316450.1316456", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:12:59 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Learning computing with respect to the context of its use has been linked in previous reports to student motivation in introductory Computer Science (CS) courses. In this report, we consider the role of context in a second course. We present a case study of a CS2 data structures class that uses a media computation context. In this course, students learn data structures and object-oriented (OO) programming through a pervasive narrative about how real media professionals use data structures to model the real world and to construct the digital images, sounds, and animations with which the students are familiar in their daily lives. We found that context played a different role in a second course than in a first course. We found evidence that some students did not need context to appreciate computing, but we also found evidence that context can help students get engaged with the material that they otherwise do not find interesting. In particular, the narrative aspect of a context may help students in relating the elements of the course and may even help with learning.", acknowledgement = ack-nhfb, articleno = "6", keywords = "course design; CS1/2; media computation", } @Article{McCartney:2008:CJ, author = "Robert McCartney and Josh Tenenberg", title = "From Conference to Journal", journal = j-JERIC, volume = "8", number = "1", pages = "1:1--1:??", month = mar, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1348713.1348714", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:13:08 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Revising and extending conference articles for journal publication benefits both authors and readers. The new articles are more complete, and benefit from peer review, feedback from conference presentation, and greater editorial consistency. For those articles that are appropriate, we encourage authors to do this, and present two examples of such articles in this issue.", acknowledgement = ack-nhfb, articleno = "1", keywords = "conference; journal; publication", } @Article{Gestwicki:2008:TDP, author = "Paul Gestwicki and Fu-Shing Sun", title = "Teaching Design Patterns Through Computer Game Development", journal = j-JERIC, volume = "8", number = "1", pages = "2:1--2:??", month = mar, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1348713.1348715", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:13:08 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "We present an approach for teaching design patterns that emphasizes object-orientation and patterns integration. The context of computer game development is used to engage and motivate students, and it is additionally rich with design patterns. A case study is presented based on EEClone, an arcade-style computer game implemented in Java. Our students analyzed various design patterns within EEClone, and from this experience, learned how to apply design patterns in their own game software. The six principal patterns of EEClone are described in detail, followed by a description of our teaching methodology, assessment techniques, and results.", acknowledgement = ack-nhfb, articleno = "2", keywords = "assessment; design patterns; games in education; UML", } @Article{Du:2008:SSI, author = "Wenliang Du and Ronghua Wang", title = "{SEED}: a Suite of Instructional Laboratories for Computer Security Education", journal = j-JERIC, volume = "8", number = "1", pages = "3:1--3:??", month = mar, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1348713.1348716", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:13:08 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles must be grounded in experience. This calls for effective laboratory exercises (or course projects). Although a number of laboratories have been designed for security education, they only cover a small portion of the fundamental security principles. Moreover, their underlying lab environments are different, making integration of these laboratories infeasible for a semester-long course. Currently, security laboratories that can be widely adopted are still lacking, and they are in great demand in security education.\par We have developed a novel laboratory environment (referred to as SEED). The SEED environment consists of Minix, an instructional operating system (OS), and Linux, a production OS; it takes advantage of the simplicity of Minix and the completeness of Linux, and provides a unified platform to support a rich set of laboratories for computer security education. Based on the SEED environment, we have developed a list of laboratories that cover a wide spectrum of security principles. These labs provide opportunities for students to develop essential skills for secure computing practice. We have been using these labs in our courses during the last five years. This article presents our SEED environment, laboratories, and evaluation results.", acknowledgement = ack-nhfb, articleno = "3", keywords = "education; instructional laboratories; security", } @Article{Tenenberg:2008:GST, author = "Josh Tenenberg and Robert McCartney", title = "Grounding the Scholarship of Teaching and Learning in Practice", journal = j-JERIC, volume = "8", number = "2", pages = "4:1--4:??", month = jun, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1362787.1362788", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:13:14 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "We invite submissions to ACM/JERIC from teaching practitioners who are our readers. Grounding these submissions in the lived practice of teaching; using data that is already collected to assess student learning; and reporting the data collection, analysis, and context of use accurately and honestly are key aspects for taking a scholarly approach to teaching and learning. We hope to see more such scholarly inquiries by computing educators in the pages of future issues.", acknowledgement = ack-nhfb, articleno = "4", keywords = "practitioner knowledge; scholarship of teaching and learning", } @Article{Sakhnini:2008:RAH, author = "Victoria Sakhnini and Orit Hazzan", title = "Reducing Abstraction in High School Computer Science Education: {The} Case of Definition, Implementation, and Use of Abstract Data Types", journal = j-JERIC, volume = "8", number = "2", pages = "5:1--5:??", month = jun, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1362787.1362789", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:13:14 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "The research presented in this article deals with the difficulties and mental processes involved in the definition, implementation, and use of abstract data types encountered by 12$^{th}$ grade advanced-level computer science students. Research findings are interpreted within the theoretical framework of reducing abstraction [Hazzan 1999]. The article describes the research setting and findings and concludes with some pedagogical implementations.", acknowledgement = ack-nhfb, articleno = "5", keywords = "abstract data types; abstraction; computer science education; problem solving; reducing abstraction", } @Article{Zendler:2008:EFC, author = "Andreas Zendler and Christian Spannagel", title = "Empirical Foundation of Central Concepts for Computer Science Education", journal = j-JERIC, volume = "8", number = "2", pages = "6:1--6:??", month = jun, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1362787.1362790", ISSN = "1531-4278", bibdate = "Fri Jun 20 10:13:14 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "The design of computer science curricula should rely on central concepts of the discipline rather than on technical short-term developments. Several authors have proposed lists of basic concepts or fundamental ideas in the past. However, these catalogs were based on subjective decisions without any empirical support. This article describes the empirical determination of central concepts for computer science education. Experts of computer science rated 49 concepts regarding four criteria. The cluster analysis of the data revealed the following central concepts: problem, data, computer, test, algorithm, process, system, information, language, communication, software, program, computation, structure, and model.", acknowledgement = ack-nhfb, articleno = "6", keywords = "central concepts; fundamental ideas", } @Article{McCartney:2008:MIR, author = "Robert McCartney and Josh Tenenberg", title = "Making it Real", journal = j-JERIC, volume = "8", number = "3", pages = "7:1--7:??", month = oct, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1404935.1404936", ISSN = "1531-4278", bibdate = "Fri Oct 10 12:52:01 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Some have proposed that realistic problem situations are better for earning. This issue contains two articles that examine the effects of ``making it real'' in computer architecture and human-computer interaction.", acknowledgement = ack-nhfb, articleno = "7", keywords = "context; realism", } @Article{Tew:2008:CSL, author = "Allison Elliott Tew and Brian Dorn and William D. {Leahy, Jr.} and Mark Guzdial", title = "Context as Support for Learning Computer Organization", journal = j-JERIC, volume = "8", number = "3", pages = "8:1--8:??", month = oct, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1404935.1404937", ISSN = "1531-4278", bibdate = "Fri Oct 10 12:52:01 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "The ubiquity of personal computational devices in the lives of today's students presents a meaningful context for courses in computer organization beyond the general-purpose or imaginary processors routinely used. This article presents results of a comparative study examining student performance in a conventional organization course and in one that has been contextualized using a personal gaming platform as the pedagogical architecture. We find minimal differences in student learning but significant motivation and engagement gains for those in the contextualized course.", acknowledgement = ack-nhfb, articleno = "8", keywords = "computer organization; context; course design", } @Article{Yardi:2008:HAC, author = "Sarita Yardi and Pamela Krolikowski and Taneshia Marshall and Amy Bruckman", title = "An {HCI} Approach to Computing in the Real World", journal = j-JERIC, volume = "8", number = "3", pages = "9:1--9:??", month = oct, year = "2008", CODEN = "????", DOI = "https://doi.org/10.1145/1404935.1404938", ISSN = "1531-4278", bibdate = "Fri Oct 10 12:52:01 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "We describe the implementation of a six-week course to teach Human-Computer Interaction (HCI) to high school students. Our goal was to explore the potential of HCI in motivating students to pursue future studies in related computing fields. Participants in our course learned to make connections between the types of technology they use in their daily lives and the design processes that went into creating these technologies. We suggest that by portraying computing through the lens of HCI, as an innovative, creative, and challenging field with authentic, real-world applications, we may be able to motivate students to become more interested in computing.", acknowledgement = ack-nhfb, articleno = "9", keywords = "broadening participation in computing; education; human-computer interaction; K-12 curriculum; motivation", } @Article{Tenenberg:2009:APS, author = "Josh Tenenberg and Robert McCartney", title = "Answering Part of the Significant Question", journal = j-JERIC, volume = "8", number = "4", pages = "10:1--10:??", month = jan, year = "2009", CODEN = "????", DOI = "https://doi.org/10.1145/1482348.1482349", ISSN = "1531-4278", bibdate = "Mon Feb 2 16:27:27 MST 2009", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Most scientific articles address particular questions which are part of larger questions. The part-whole relationship varies.", acknowledgement = ack-nhfb, articleno = "10", keywords = "Extension; prerequisite", } @Article{Armoni:2009:RCM, author = "Michal Armoni", title = "Reduction in {CS}: a (Mostly) Quantitative Analysis of Reductive Solutions to Algorithmic Problems", journal = j-JERIC, volume = "8", number = "4", pages = "11:1--11:??", month = jan, year = "2009", CODEN = "????", DOI = "https://doi.org/10.1145/1482348.1482350", ISSN = "1531-4278", bibdate = "Mon Feb 2 16:27:27 MST 2009", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "Reduction is a problem-solving strategy, relevant to various areas of computer science, and strongly connected to abstraction: a reductive solution necessitates establishing a connection among problems that may seem totally disconnected at first sight, and abstracts the solution to the reduced-to problem by encapsulating it as a black box. The study described in this article continues a previous, qualitative study that examined the ways undergraduate computer science students perceive, experience, and use reduction as a problem-solving strategy. The current study examines the same issue, but in the context of a larger population, using also quantitative analysis, and focusing on algorithmic problems. The findings indicate difficulties students have with the abstract characteristics of reduction and with acknowledging reduction as a general problem-solving strategy.", acknowledgement = ack-nhfb, articleno = "11", keywords = "black box; Reduction; reductive thinking", } @Article{Jayal:2009:PLA, author = "Ambikesh Jayal and Martin Shepperd", title = "The Problem of Labels in {E}-Assessment of Diagrams", journal = j-JERIC, volume = "8", number = "4", pages = "12:1--12:??", month = jan, year = "2009", CODEN = "????", DOI = "https://doi.org/10.1145/1482348.1482351", ISSN = "1531-4278", bibdate = "Mon Feb 2 16:27:27 MST 2009", bibsource = "http://www.acm.org/pubs/contents/journals/jeric/; http://www.math.utah.edu/pub/tex/bib/jeric.bib", abstract = "In this article we explore a problematic aspect of automated assessment of diagrams. Diagrams have partial and sometimes inconsistent semantics. Typically much of the meaning of a diagram resides in the labels; however, the choice of labeling is largely unrestricted. This means a correct solution may utilize differing yet semantically equivalent labels to the specimen solution. With human marking this problem can be easily overcome. Unfortunately with e-assessment this is challenging. We empirically explore the scale of the problem of synonyms by analyzing 160 student solutions to a UML task. From this we find that cumulative growth of synonyms only shows a limited tendency to reduce at the margin despite using a range of text processing algorithms such as stemming and auto-correction of spelling errors. This finding has significant implications for the ease in which we may develop future e-assessment systems of diagrams, in that the need for better algorithms for assessing label semantic similarity becomes inescapable.", acknowledgement = ack-nhfb, articleno = "12", keywords = "diagrams; E-assessment", }