Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki Oct 2014

Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki

Andrew J. Kornecki

In discussions about the development and use of computer systems and software products, the term “professional software engineer” is used repeatedly. In the last two decades there has been significant effort devoted to enhancing and advancing the state of professional software engineering (SwE) – new software engineering processes, methods, tools, and practices; creation of a software engineering body of knowledge [1]; development of a code of ethics and professional conduct [2], and software certification and licensing programs [3] . In 1989 the Software Engineering Institute (SEI) of Carnegie Mellon University published a landmark report on graduate education in software engineering …


Population Validity For Educational Data Mining Models: A Case Study In Affect Detection, Ryan Baker, Jaclyn Ocumpaugh, Sujith Gowda, Neil Heffermnan, Cristina Heffernan Dec 2013

Population Validity For Educational Data Mining Models: A Case Study In Affect Detection, Ryan Baker, Jaclyn Ocumpaugh, Sujith Gowda, Neil Heffermnan, Cristina Heffernan

Ryan S.J.d. Baker

ICT-enhanced research methods such as educational data mining (EDM) have allowed researchers to effectively model a broad range of constructs pertaining to the student, moving from traditional assessments of knowledge to assessment of engagement, meta-cognition, strategy, and affect. The automated detection of these constructs allows EDM researchers to develop intervention strategies that can be implemented either by the software or the teacher. It also allows for secondary analyses of the construct, where the detectors are applied to a data set that is much larger than one that could be analyzed by more traditional methods. However, in many cases, the data …