Author |
Title |
Alhamamah, Abdullah |
Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network |
Borchert, Otto |
Recent Advances in Immersive Virtual Worlds for Education |
Carpenter, Donald |
Reinforcing Learning in the Data Communications Course Using a Teleprocessing Line Speed Decision Support System |
Chihos, Dan |
Linux - Is it right for you? |
Christen, Rebecca |
Enhancing an ATM Simulator |
Clawson, Joel |
Enhancing an ATM Simulator |
Drake, Janet |
Grading with a Team |
East, Philip |
Experience with In-person Grading |
Engebretson, Alec |
Building Experiences Outside the Computer Classroom Inside the Computer Curriculum |
Faux, Rob |
The Role of Observation in Computer Science Learning |
Faux, Rob |
Teaching Problem Solving Techniques and Software Engineering Concepts Before Programming |
Flies, Daniel |
Building a Classroom Data Warehouse |
Gibbons, Thomas |
Student Centered Learning in the Introductory Computer Course |
Gray, Paul |
Pulling Teeth: Why Advanced Technology is Not Prevalent in the Classroom |
Guster, Dennis |
Integrating Network Attached Mass Storage Systems into Educational Networks: Performance and Security Issues |
Guster, Dennis |
The Development of an Intrusion Detection/Defense System for Linux Hosts |
Guster, Dennis |
Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network |
Hall, Charles |
Integrating Network Attached Mass Storage Systems into Educational Networks: Performance and Security Issues |
Harper, Sarah |
Distance Learning Experience |
Haug, Frank |
Tradeoffs and Guidelines for Selecting Technologies to Generate Web Content from Relational Data Stores |
Helixon, Tracy |
To the Classroom and Beyond: Designing and Implementing an Online Writing Center to Help Students Develop College and Career Writing Skills |
Hettiarachchy, Jay |
A Global Digital "Sandbox": Can Small College Computer Classes Play in it and How? |
Hill, Curt |
Evolution of ProgrammingLand |
Julstrom, Bryant |
The Union-Find Partition in Evolutionary Operators for Spanning Trees Encoded as Lists of Edges |
Julstrom, Bryant |
A Web-Based Evolutionary Algorithm Demonstration using the Traveling Salesman Problem |
Kaiser, Dan |
A "Gentler" Introduction to Order Notation and Asymptotic Analysis |
Lange, Caroline |
Managing Expectations: Suggested Guidelines for Student Development of Software for Non-Programming Staff in the University Setting |
Lawal, Banji |
The Development of an Intrusion Detection/Defense System for Linux Hosts |
Litvinov, Semyon |
Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network |
Lopez, A. |
Distance Learning Experience |
Lopez, A. |
Enhancing an ATM Simulator |
Lopez, Dian |
Building a Classroom Data Warehouse |
Lopez, Dian |
Data Mining at the Undergraduate Level |
Ludwig, Luke |
Data Mining at the Undergraduate Level |
Marsh, Ronald |
Operating Systems I: An Operating Systems Simulation Developed as Homework |
Maurer, W. D. |
Computer Solutions of Simultaneous Equations: A Byproduct of the First Programming Course |
Meng, Jing |
A Reformed Scheme of Teaching Memory Management in Operating System Courses |
Morgan, Siobahn |
AJJAR - Astronomical Javascript/Java Applet Resource |
Mowe, Richard |
A Web-Based Evolutionary Algorithm Demonstration using the Traveling Salesman Problem |
O'Neil, Thomas |
A Graphical 3-SAT Program for Research and Instruction |
Podtburg, Stephanie |
Simulated Effects Of PGP Encryption On Network Performance |
Raasch, Robert |
Taking X-ray images to the Web, the process and use in Radiography Education |
Rahimi, Saeed |
Tradeoffs and Guidelines for Selecting Technologies to Generate Web Content from Relational Data Stores |
Reed, David |
Developing Empirical Skills in an Introductory Computer Science Course |
Robinson, David |
Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network |
Rooney, Dan |
To the Classroom and Beyond: Designing and Implementing an Online Writing Center to Help Students Develop College and Career Writing Skills |
Sanni, Shakir |
Securing Local Area Networks with Firewalls: An Overview of its Application to Windows NT and Unix-Based Networks |
Sprafka, Sandy |
Internet Videoconferencing - What We've Learned |
Sturm, Thomas |
Will Robots Destroy Us?: Teaching Students About Technological Implications |
TeStrake, YouKyung (Kim) |
The Use of Jargon in Software Requirements |