Sciweavers

SIGCSE
1997
ACM
112views Education» more  SIGCSE 1997»
13 years 11 months ago
Introducing fixed-point iteration early in a compiler course
When teaching a course in compiler design, it is conventional to introduce the iterative calculation of least fixed points quite late in the course, in the guise of iterative dat...
Max Hailperin
SIGCSE
1997
ACM
119views Education» more  SIGCSE 1997»
13 years 11 months ago
Exploring Martian planetary images: C++ exercises for CS1
We present a series of programming exercises based on photographic images of Mars collected by the NASA Viking Orbiter. Even without the news that there may once have been life on...
Harriet J. Fell, Viera K. Proulx
SIGCSE
1997
ACM
111views Education» more  SIGCSE 1997»
13 years 11 months ago
Teaching an engineering approach for network computing
Parallelism and concurrency have long been considered as non essential during the cursus of the average programmer. However, thanks to technological advances, new promising forms ...
Eric Dillon, Carlos Gamboa Dos Santos, Jacques Guy...
SIGCSE
1997
ACM
95views Education» more  SIGCSE 1997»
13 years 11 months ago
A Web based configuration control system for team projects
In courses involving team programming projects, it is desirable to have team members share files, and establish procedures for developing a configuration. Often, faculty members a...
Ronald Curtis
SIGCSE
1997
ACM
121views Education» more  SIGCSE 1997»
13 years 11 months ago
Application-based modules using apprentice learning for CS 2
A typical Data Structures (CS 2) course covers a wide variety of topics: elementary algorithm analysis; data structures including dynamic structures, trees, tables, graphs, etc.; ...
Owen L. Astrachan, Robert F. Smith, James T. Wilke...
ERCIMDL
1998
Springer
78views Education» more  ERCIMDL 1998»
13 years 12 months ago
Electronic Roads in the Information Society
Costas Zervos, Stathis Panis, Dionysis Dionysiou, ...
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
13 years 12 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
ERCIMDL
1998
Springer
174views Education» more  ERCIMDL 1998»
13 years 12 months ago
Intelligent Multimedia Communication
Multimedia communication is a part of everyday life and its appearance in computer applications is increasing in frequency and diversity. Intelligent or knowledge based computer su...
Mark T. Maybury, Oliviero Stock, Wolfgang Wahlster