With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Introductory computer science students rely on a trial and error approach to fixing errors and debugging for too long. Moving to a reflection in action strategy can help students ...
Reacting to challenges that have been observed in humancomputer interaction (HCI) education, as well as the multidisciplinary design, science, and engineering underpinnings, we in...
D. Scott McCrickard, Christa M. Chewar, Jacob P. S...
In June 2003, Lehigh University embarked on an experiment to present incoming freshmen with an online pre-orientation experience using the SCT Luminis 3 Portal environment. Three ...
We study the random composition of a small family of O(n3 ) simple permutations on {0, 1}n . Specifically we ask what is the number of compositions needed to achieve a permutatio...
Shlomo Hoory, Avner Magen, Steven Myers, Charles R...