Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer science education (5)
- Scientific computing (5)
- Broadening participation (3)
- Computer science (2)
- Education (2)
-
- Equity (2)
- Functional programming (2)
- Meetings (2)
- Programming languages (2)
- Programming methodology (2)
- STEM (2)
- Scala (2)
- Software architecture (2)
- Software engineering education (2)
- Special issues and sections (2)
- Adolescent health (1)
- Algorithms (1)
- Cloud computing (1)
- Community college (1)
- Computer course (1)
- Computerized (1)
- Concurrency (1)
- Cs1 (1)
- Cs2 (1)
- Cultural differences (1)
- Curriculum development (1)
- DACUM (1)
- E-learning (1)
- Engineering (1)
- HPV (1)
Articles 1 - 14 of 14
Full-Text Articles in Education
Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis
Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis
Konstantin Läufer
Various hybrid-functional languages, designed to balance compile-time error detection, conciseness, and performance, have emerged. Scala, e.g., is interoperable with Java and has become an early leader in adoption, especially in the start-up and open-source spaces. As educators, we have recognized Scala’s value as a teaching language across the CS curriculum. In CS1, the read-eval-print loop and simple, uniform syntax aid programming in the small. In CS2, higher-order methods allow concise, efficient manipulation of collections. In a programming languages course, advanced constructs facilitate the separation of concerns, program representation and interpretation, and concurrent programming. In advanced applied courses, language mechanisms and …
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal
Konstantin Läufer
Recent changes in the environment of Loyola University Chicago’s Department of Computer Science include a better differentiation of our four undergraduate majors, growing interest in computing among science majors, and an increased demand for graduates with mobile and cloud skills. In our continued effort to incorporate parallel and distributed computing topics into the undergraduate curriculum, we are focusing on these three existing courses: CS1: In response to a request from the physics department, we started to offer a CS1 section aimed at majors in physics and other hard sciences this spring semester. This section includes some material on numerical methods …
Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis
Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis
George K. Thiruvathukal
Various hybrid-functional languages, designed to balance compile-time error detection, conciseness, and performance, have emerged. Scala, e.g., is interoperable with Java and has become an early leader in adoption, especially in the start-up and open-source spaces. As educators, we have recognized Scala’s value as a teaching language across the CS curriculum. In CS1, the read-eval-print loop and simple, uniform syntax aid programming in the small. In CS2, higher-order methods allow concise, efficient manipulation of collections. In a programming languages course, advanced constructs facilitate the separation of concerns, program representation and interpretation, and concurrent programming. In advanced applied courses, language mechanisms and …
A Pilot Study Of Computerized, Tailored Intervention To Promote Hpv Vaccination In Mexican-Heritage Adolescents, Angaela Chia-Chen Chen, Michael Todd, Ashish Amresh, Usha Menon, Laura Szalacha
A Pilot Study Of Computerized, Tailored Intervention To Promote Hpv Vaccination In Mexican-Heritage Adolescents, Angaela Chia-Chen Chen, Michael Todd, Ashish Amresh, Usha Menon, Laura Szalacha
Ashish Amresh
An Adaptive Time Reduction Technique For Video Lectures, Sreenivas P. Shenoy, Ashish Amresh, John Femiani
An Adaptive Time Reduction Technique For Video Lectures, Sreenivas P. Shenoy, Ashish Amresh, John Femiani
Ashish Amresh
Self-Assessment And Student Improvement In An Introductory Computer Course At The Community College Level, Jama Spicer-Sutton, James Lampley, Donald W. Good
Self-Assessment And Student Improvement In An Introductory Computer Course At The Community College Level, Jama Spicer-Sutton, James Lampley, Donald W. Good
Donald W. Good
Excerpt:The purpose of this study was to determine a student’s computer knowledge upon course entry and if there was a difference in college students’ improvement scores as measured by the difference in pretest and post‐test scores of new or novice users, moderate users, and expert users at the end of a college level introductory computing class.
What Literacy Means In Math Class: Teacher Team Explores Ways To Remake Instruction To Develop Students' Skills, Jacy Ippolito, Christina L. Dobbs, Megin Charner-Laird
What Literacy Means In Math Class: Teacher Team Explores Ways To Remake Instruction To Develop Students' Skills, Jacy Ippolito, Christina L. Dobbs, Megin Charner-Laird
Jacy Ippolito
Work Integrated Learning In Stem In Australian Universities: Final Report: Submitted To The Office Of The Chief Scientist, Daniel Edwards, Kate Perkins, Jacob Pearce, Jennifer Hong
Work Integrated Learning In Stem In Australian Universities: Final Report: Submitted To The Office Of The Chief Scientist, Daniel Edwards, Kate Perkins, Jacob Pearce, Jennifer Hong
Kate Perkins
The Australian Council for Educational Research (ACER) undertook this study for the Office of the Chief Scientist (OCS). It explores the practice and application of Work Integrated Learning (WIL) in STEM, with a particular focus on natural and physical sciences, information technology, and agriculture departments in Australian universities. The project involved a detailed ‘stocktake’ of WIL in practice in these disciplines, with collection of information by interview, survey instruments, consultation with stakeholders and literature reviews. Every university in Australia was visited as part of this project, with interviews and consultation sessions gathering insight from more than 120 academics and support …
Who Needs Tablets? We Do, George K. Thiruvathukal
Who Needs Tablets? We Do, George K. Thiruvathukal
George K. Thiruvathukal
What role do tablets play increasingly in our daily lives? Is it possible that they could revolutionize the future of publishing and education?
Productivity In The Cognitive Overload Era, George K. Thiruvathukal
Productivity In The Cognitive Overload Era, George K. Thiruvathukal
George K. Thiruvathukal
Could technologies that emphasize the concept of "we" rather than "me" help modern society overcome its information overload?
Guest Editors' Introduction: Research On Equity And Sustained Participation In Engineering, Computing, And Technology, Tiffany Barnes, Jamie Payton, George K. Thiruvathukal, Kristy Elizabeth Boyer, Jeff Forbes
Guest Editors' Introduction: Research On Equity And Sustained Participation In Engineering, Computing, And Technology, Tiffany Barnes, Jamie Payton, George K. Thiruvathukal, Kristy Elizabeth Boyer, Jeff Forbes
George K. Thiruvathukal
The guest editors introduce best papers on broadening participation in computing from the RESPECT'15 conference. The five articles presented here are part one of a two-part series representing research on broadening participation in computing at all levels of education: from K-12 schools through graduate school, with a focus on diversity with regard to gender, race, and ethnicity.
Guest Editors' Introduction: Best Of Respect, Part 2, Tiffany Barnes, Jamie Payton, George K. Thiruvathukal, Jeff Forbes, Kristy Elizabeth Boyer
Guest Editors' Introduction: Best Of Respect, Part 2, Tiffany Barnes, Jamie Payton, George K. Thiruvathukal, Jeff Forbes, Kristy Elizabeth Boyer
George K. Thiruvathukal
The guest editors introduce best papers on broadening participation in computing from the RESPECT'15 conference. The five articles presented here are part two of a two-part series representing research on broadening participation in computing. These articles study participation in intersectional ways, through the perceptions and experiences of African-American middle school girls, the sense of belonging in computing for LGBTQ students, the impact of a STEM scholarship and community development program for low-income and first-generation college students, a leadership development program, and how African-American women individually take leadership to enable their success in computing.
The Need For Research In Broadening Participation, Tiffany Barnes, George K. Thiruvathukal
The Need For Research In Broadening Participation, Tiffany Barnes, George K. Thiruvathukal
George K. Thiruvathukal
Underrepresentation in computing is a global problem, marked by a disturbing lack of access to computing resources and education among people underrepresented by race, ethnicity, gender, income, disability, and sexual-orientation status. It is urgent that we address this divide between those with and without the knowledge to create computational artifacts or even basic functional literacy. Important alliances for broadening participation (BP) are catalyzing efforts to engage more people in computing, but they are not enough. We need solid research as well.
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Wendi M. Kappers, PhD
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …