Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
The Foundation Coalition and others have been working on the development of Concept Inventory (CI) assessment instruments patterned after the well-known Force Concept Inventory...
Speech-based applications commonly come with web-based or printed manuals. Alternatively, the dialogue can be designed so that users should be able to start using the application ...
Jaakko Hakulinen, Markku Turunen, Esa-Pekka Salone...
In this paper, we establish the need (based on literature and anecdotal evidence) for an infrastructure for CS1 courses to visually support problem solving from the initial proble...
Mohammad H. N. Tabrizi, Carol B. Collins, E. Ozan,...
Traditionally, universities focus primarily on instructionist teaching. Such an understanding has been criticized from theoretical and practical points of view. We believe that so...