Sciweavers

SIGITE
2005
ACM
13 years 10 months ago
Towards using online portfolios in computing courses
The direct experience we had with teaching a summer pre-college computing course in which we adopted an online portfolio approach has led us to consider the use of online portfoli...
Bryan Higgs, Mihaela Sabin
SIGITE
2005
ACM
13 years 10 months ago
Integration of information assurance and security into the IT2005 model curriculum
In this paper we present the context of the work of the Curriculum Committee on IT2005, the IT curriculum volume described in the Overview Draft document of the Joint Task Force f...
Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lun...
SIGITE
2005
ACM
13 years 10 months ago
Teaching 2D arrays using real-time video filters
Educators have long been trying to spice things up in their introductory programming courses. Traditionally, twodimensional arrays have been taught non-graphically using contrived...
Jeffrey W. Chastine, Jon A. Preston
SIGITE
2005
ACM
13 years 10 months ago
A cross-collegiate analysis of software development course content
Many undergraduate IT programs recognize that their graduates will find jobs as software developers. As such, software development (analysis and design) courses are often a core r...
Timothy Burns, Robb Klashner
SIGITE
2005
ACM
13 years 10 months ago
Common sense computing: an approach to community outreach with IT
This poster paper describes a series of 2-3 minute radio segments called “Common Sense Computing” designed to provide common sense explanations of computing technology. Comput...
Jeanna Neefe Matthews
SIGITE
2005
ACM
13 years 10 months ago
The role of programming in IT
Early in its history as an academic discipline, depth in computer programming was a primary distinguishing factor between IT and older computing disciplines, such as computer scie...
Dianne P. Bills, John A. Biles
SIGITE
2005
ACM
13 years 10 months ago
Hands-on approach to teaching computer networking using packet traces
This paper describes a novel approach to teaching computer networking through packet traces of actual network traffic. The paper describes a set of exercises that use packet trace...
Jeanna Neefe Matthews