Case studies are widely used in business and medicine to help students learn from the successes and failures of practitioners in the field. This paper discusses the potential bene...
Kay A. Robbins, Catherine Sauls Key, Keith Dickins...
Existing techniques for approximate storage of visited states in a model checker are too special-purpose and too DRAM-intensive. Bitstate hashing, based on Bloom filters, is good ...
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Based on research that studied the challenges and difficulties faced by students taking games studies and game design courses, we propose that, while many students enrolled in gam...