Journal of Computing Sciences in Colleges, Volume 19 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 19, Number 1 [1], October 2003
2003 CCSC Midwestern conference

Henry M. Walker:
Getting published at CS education conferences: factors for acceptance, approaches, reflections. 6-7

Charles Frank, Robert Montante:
Computer security laboratory tools workshop. 8-9

Samuel C. Hsieh:
Software engineering for Web application development. 10-19

Daniel C. Cliburn:
Experiences with pair programming at a small college. 20-29

Joan Krone:
Multiple implementations for component based software using Java interfaces. 30-38

Michael P. Rogers:
Embedded systems programming tutorial. 39-40

Ralph Reilly, Plamen Tchimev:
Neural network approach to solving the Traveling Salesman Problem. 41-61

Luke Hodgkinson, Ellen Walker:
An expert system for credit evaluation and explanation. 62-72

Cynthia J. Martincic, David Carlson:
The NSF CSEMS grant program: our experience with the proposal process and program execution. 73-82

Pete Sanderson:
Where's (the) computer science in service-learning? 83-89

Tom Wulf:
Teaching ethics in undergraduate network security courses: the cautionary tale of Randal Schwartz. 90-93

Tom Wulf:
Implementing a minimal lab for an undergraduate network security course. 94-98

Henry M. Walker, Michael J. Jipping, Douglas Baldwin:
The computer science major within a liberal arts environment. 99-101

Daniel C. Cliburn:
Teaching an introductory computer graphics course using OpenGL. 102-103

David R. Surma:
Teaching microprocessors utilizing a project-based approach. 104-112

Ellen Lowenfeld Walker, Oberta A. Slotterbeck:
Supporting large projects in a small college computer systems management program. 113-121

Robert E. Beasley:
Conducting a successful senior capstone course in computing. 122-131

Catherine C. Bareiss, Scott M. Thede, Kevin Joiner, Joseph Oldham:
CS: SDI: challenges and solutions for small departments. 132

Dean Sanders:
Tools and techniques for teaching object-oriented concepts. 133-134
Volume 19, Number 1 [2], October 2003
2003 CCSC Rocky Mountain Conference

Clinton Jeffery:
Teaching software engineering using UML and RAD. 138

Ernest L. Carey:
A quest for ABET accreditation: in retrospect. 139-146

Jack Decker, Nan Sun:
Implementing the IEEE/ACM CC2001-CS model. 147-159

Dennis J. Bouvier:
Integrating graphics and visual computing topics into the CS curriculum. 160-166

Thomas R. Brown, Tim Reeves, Terry Scott:
Assigning and grading computer programs. 167-168

Peter C. Isaacson:
A mini software engineering project for CS0. 169-178

Peter C. Isaacson:
Using Python modules in CS0 topics. 179-181

Amit Parnerkar, Dennis C. Guster, Jayantha Herath:
Secret key distribution protocol using public key cryptography. 182-193

Charles M. Shub:
A unified treatment of deadlock. 194-204

David R. Surma:
Using graph theory to reduce communication overhead in parallel systems. 205-214

Thomas R. Brown, Peter C. Isaacson, Ronald D. McFarland, Noel F. LeJeune:
Effectively teaching program design. 215-217

Dennis J. Bouvier, Gary Lewandowski, Terry Scott:
Developing a computer science education research program. 218

Tod Amon:
Bicycle club mileage log: a servlet application for teaching Web programming. 219-226

John D. Haney:
Something lost - something gained: from COBOL to Java to C# in intermediate programming courses. 227-234

Ronald D. McFarland:
Teaching students to learn in the computer science and information systems curriculum: creating a distinction between content and methods. 235-245

Bruce Mechtly:
Secure HTTP, using and creating certificates. 246-247

Bhagyavati, Glenn Hicks:
A basic security plan for a generic organization. 248-256

Terry Scott:
Do assignments with required GUI's help students learn? 257-266

Terry Scott:
Bloom's taxonomy applied to testing in computer science classes. 267-274

Noel F. LeJeune:
Critical components for successful collaborative learning in CS1. 275-285

Peter C. Isaacson:
Building a simple website using open source software (GNU/Linux, Apache, MySQL, and Python). 286-288

Bruce Mechtly, Jack Decker:
Using ethereal and TCPportconnect in undergraduate networking labs. 289-298

Gary Lewandowski:
Using process journals to gain qualitative understanding of beginning programmers. 299-310

W. Douglas Maurer:
Assembly language implications of single and multiple inheritance. 311-320

Noel F. LeJeune, Jerry Shultz:
J tools for CS1. 321-322

Kailash Chandra, Sapana Suhani Chandra, Shyamal Suhana Chandra:
A comparison of VBscript, Javascript, and Jscript. 323-335

Cynthia J. Martincic:
QUE: an expert system explanation facility that answers "why not" types of questions. 336-348

Robert McCloskey, John Beidler, Yaodong Bi:
CS2 and Java's comparator interface. 349-361
Volume 19, Number 2 [1], December 2003
2003 CCSC Northwestern Conference

Joan M. Francioni:
Making computer science accessible for students with visual disabilities. 5

Katrin Becker:
A multiple-intelligences approach to teaching number systems. 6-17

E. Grant Eastman:
Fact-based problem identification precedes problem solving. 18-29

Kenrick J. Mock:
The development of a CS0 course for distance delivery. 30-38

Vibha Sazawal, Sarah E. Schwarm, Barbara Goldner, Ed Gellenbeck, Carol Zander:
Assessment of student learning in computer science education. 39-42

Richard J. Spillman:
Impact of quantum computing on computer science/engineering education. 43-44

Douglas D. Bickerstaff, Sean Drexler, Ray Moro, Jun Sato:
Building client/server applications with Oracle9i, JDBC, and SQLJ. 45-46

Jung-Ho Huh, Tae-Mu Chang:
Hierarchical disk cache management in RAID 5 controller. 47-59

Mohamad R. Neilforoshan:
Performance evaluation of memory systems. 60-67

E. Grant Eastman, Judith Bayard Cushing, Kenneth D. Blaha, George Hauser, Ronald Tenison, Elaine Weltz, Sharon M. Tuttle:
Computing curriculum 2001: how does this report affect the computing science curricula? 68-69

Lynn Bly:
The Washington center for information technology (WCIT): preparing students for the current job market. 70-71

Judy Cushing, Kate Cunningham, George Freeman:
Towards best practices in software teamwork. 72-81

Timothy V. Fossum, Susan M. Haller:
Reinforcing programming language concepts through implementation in a concept-based course. 82-90

Donald Chinn, Phillip Prins, Josh Tenenberg:
The role of the data structures course in the computing curriculum. 91-93

Joe Hummel:
Tutorial in modern software development using Microsoft. NET and C#: building windows application (part 1) and web-based applications (part 2). 94

Mohamad R. Neilforoshan:
The environmental effect and waste management of computer manufacturing. 95-100

Pete Nordquist, Anna Petersen, Angelina Todorova:
License tracing in free, open, and proprietary software. 101-112

Sherry Yang, Todd Breedlove, Ralph Carestia:
Teaching introductory classes using LEGO robotics. 113-114

Jennifer R. Parham:
An assessment and evaluation of computer science education. 115-127

Scott Burgess:
Course modularization for improved delivery and assessment. 128-134

Rebecca H. Rutherfoord:
Copyright, law and ethics on the web - issues for the computing educator. 135-136
Volume 19, Number 2 [2], December 2003
2003 CCSC Southeastern Conference

Blaise W. Liffick:
Assistive technology as an HCI topic. 142-144

S. K. Adam, W. F. Simpson:
Strategies for managing the execution of unauthorized programs on a university computer network. 145-154

Stephen G. Corbesero:
Teaching system and network administration in a small college environment. 155-163

Thomas E. Carpenter Jr.:
A simple algorithm to decipher declarations. 164-174

John H. Reynolds:
Bootstrapping a self-compiling compiler from machine X to machine Y. 175-181

Jim Huggins, Clif Kussmaul, Amruth Kumar, John A. Trono:
Multi-phase homework assignments in CS I and CS II. 182-184

Lubomir Ivanov:
A hardware lab for the computer organization course at small colleges. 185-190

Daniel H. Marcellus, Jose Arreola:
DEHAM2 - teaching an old memory to do new tricks. 191-200

Vance E. Poteat:
Embedded microcomputers: how to easily add it to the core computer science curriculum. 201-207

John Phillips, Joo Tan, Matthew Phillips, Nicholas Andre:
Design of a two-course sequence in web programming and e-commerce. 208-217

Roman M. Zaritski:
Using open source software for scientific simulations, data visualization, and publishing. 218-222

Andreas Koeller, H. Mark Hubey:
The use of computer algebra systems in computer science education. 223-231

Karen Anewalt, Jennifer A. Polack-Wahl, John Beidler, Debra L. Smarkusky:
Group projects across the curriculum. 232-237

Adrienne Decker:
A tale of two paradigms. 238-246

Brad Richards:
Experiences incorporating Java into the introductory sequence. 247-253

Linda M. Wilkens:
The joy of teaching with C#. 254-264

Joo Tan, John Phillips:
Challenges of real-world projects in team-based courses. 265-277

Victor A. Clincy:
Software development productivity and cycle time reduction. 278-287

Karen Anewalt:
Utilizing interdisciplinary teams in teaching e-commerce. 288-296

Amruth N. Kumar, Deborah Knox, Lawrence D'Antonio, Linda M. Wilkens, Frank P. Ford, Richard Wyatt:
Using resources from the Web in Computer Science courses. 297-302

Frances K. Bailie, Mary F. Courtney, Keitha A. Murray, Robert Schiaffino, Sylvester L. Tuohy:
Objects first - does it work? 303-305

Hubert A. Johnson, Laura Wilkinson:
Case tools in object-oriented analysis and design. 306-313

Joel A. Rosiene, Carolyn Pe Rosiene:
Testing in the 'small'. 314-318

Michael Olan:
Unit testing: test early, test often. 319-328

Jennifer S. Kay:
Teaching robotics from a computer science perspective. 329-336

Dennis Higgins:
A software engineering project: tying together themes and trying out teams in a CS curriculum. 337-346

Michael E. Battig:
Observations from a multi-platform approach to user interface design pedagogy. 347-357

Barbara Bracken:
Progressing from student to professional: the importance and challenges of teaching software engineering. 358-368
Volume 19, Number 3, January 2004
2003 CCSC Eastern Conference

Hong Liu, David P. Gluch:
Conceptual modeling with the object-process methodology in software architecture. 10-21

Robin M. Snyder:
Teacher specification and student implementation of a unit testing methodology in an introductory programming course. 22-32

Marsha Zaidman:
Teaching defensive programming in Java. 33-43

Yasir Zahur, T. Andrew Yang:
Wireless LAN security and laboratory designs. 44-60

Kenneth E. Hoganson, Mário Guimarães:
N-Tier Client Server systems course with emphasis to mobile devices. 61-67

Joseph D. Sloan, Charles Schlindwein:
TCP/IP laboratory exercises for use with a remotely accessible networking laboratory. 68-78

Ardian N. Greca, Robert P. Cook, James Harris:
Enhancing learning in a data communication and networking course with laboratory experiments. 79-88

Bryan Bates:
C# as a first language: a comparison with C++. 89-95

William Hawkins:
LIMP: an interpreted programming language for students, professors and programmers. 96-109

Kelly R. Cannon, Derek Riley:
Java simulation and robot modeling of the Cataglyphis Bicolor. 110-123

Kamalsinh F. Chavda:
Anatomy of a Web service. 124-134

Benjamin Hosp:
The genetic algorithm and the Prisoner's Dilemma. 135-146

Tauhida Parveen:
TPphotoSuite: a windows based digital image processing program. 147-156

Margaret S. Geroch:
Motion capture for the rest of us. 157-164

Gail Miles:
4-Hour model implementation of "computing Curriculum 2001" in a small liberal arts college. 165-171

Michael L. Nelson, David Rice:
Creating a master's degree in computer information technology. 172-180

Paula Gabbert:
Discipline focused non-major computer science courses. 181-188

Rebecca H. Rutherfoord:
Copyright, law and ethics on the web - issues for the computing educator. 189-190

Renée McCauley, Walter Pharr, George J. Pothering, Christopher W. Starr:
A proposal to evaluate the effectiveness of closed laboratories in the computer science curriculum. 191-198

Paige H. Meeker:
Introducing 3D modeling and animation into the course curriculum. 199-206

Max M. North, Joseph Sessum, Alex Zakalev:
Immersive visualization tool for pedagogical practices of computer science concepts: a pilot study. 207-215

John D. Chenoweth, Phil Pfeiffer, Qing Yuan:
Implementing a networking component in a CS/IT curriculum: an experience report. 216-225

Guillermo A. Francia III, Chi Chin Chao:
Computer networking laboratory projects. 226-237

Andrew J. Pounds, M. Buttersworth, Brent A. Mantooth:
A high performance web-based system for molecular electronic structure visualization. 238-248

Ronnie E. King, Robert F. Roggio, J. Gray Killinger:
Programming skills for a changing world: back to the basics. 249-257

Bobby Nakanelua, Michael Curtsinger:
A simulation of Knuth's mix machine as a teaching tool. 258-267

S. Krishnaprasad:
SIMD programming illustrated using Intel's MMX instruction set. 268-277

Philip J. Burton, Russel E. Bruhn:
Using UML to facilitate the teaching of object-oriented systems analysis and design. 278-290

Robert P. Webber:
. . E. E1A $R.. ?I.. .or one time pad encryption. 291-295

William H. Campbell:
Indexing permutations. 296-300

Meg Murray:
Move to component based architectures: introducing Microsoft's .NET platform into the college classroom. 301-310

Esmail Bonakdarian, Laurie White:
Robocode throughout the curriculum. 311-313
Volume 19, Number 4 [1], April 2004
2004 CCSC South Central Conference

Daniel D. McCracken:
HCI in the classroom. 5

Khaled A. Alshare, Nitham Mohammed Hindi:
The importance of presentation skills in the classroom: students and instructors perspectives. 6-15

James Harris, Maeve Cummings, Felix Dreher, Kailash Chandra:
A team teaching approach to inclusion of a security component in IS and CS curricula. 16-27

Daniel C. Cliburn:
Virtual reality for small colleges. 28-38

Jim McKeown:
The use of a multimedia lesson to increase novice programmers' understanding of programming array concepts. 39-50

Dale Bachman:
Public key cryptography. 51

Martin C. Carlisle, Terry A. Wilson, Jeffrey W. Humphries, Steven M. Hadfield:
RAPTOR: introducing programming to non-majors with flowcharts. 52-60

Chuck Pheatt:
Integrating OO concepts into a CS0 course. 61-67

Ernest Ferguson:
Impact of offshore outsourcing on CS/IS curricula. 68-77

Jennifer Kahle, Gary Schmidt:
Reasons women pursue a computer science career: perspectives of women from a mid-sized institution. 78-89

John P. Buerck:
How to incorporate the social and professional issues component of the ACM 2001 computing curriculum into a computer science degree program. 90-91

Bruce J. Neubauer, Gene A. Brewer:
Virtual scholarly collaboration: a case study. 92-98

Gary Ury:
A comparison of undergraduate student performance in online and traditional courses. 99-107

Keith A. Brandt, Margaret Richey:
Studying mathematical induction and recursive programming together. 108-114

W. Douglas Maurer:
Why matrix manipulation should be done in C++. 115-127

Clifton Dunn, Mustafa Kamal, Ernest Ferguson, Sri Siva:
Offshore outsourcing: impact on CS/IS curriculum. 128-132

Nasser Tadayon:
Software engineering based on the team software process with a real world project. 133-142

James T. Streib, James W. Chaffee:
Applications software programming. 143-148

Rebecca H. Rutherfoord:
Copyright, law and ethics on the web: issues for the computing educator. 149-150

Leslie Moody, Gary Schmidt:
Going wireless: the emergence of wireless networks in education. 151-158

Nicholas Karlson:
Testing the effectiveness of a secure classroom intranet. 159-162

Daniel C. Cliburn:
Teaching an introductory computer graphics course using OpenGL. 163

Khaled A. Alshare, Elizabeth E. Grandon, Don Miller:
Antecedents of computer technology usage: considerations of the technology acceptance model in the academic environment. 164-180

Brian Mulanda, Bruce Mechtly:
Programmatically testing concurrency in J2EE web applications. 181-186

Charles Ashbacher:
A software engineering code obfuscation project. 187-188

Jeffrey D. Martens:
A web spider project for an OOP Course. 189-190

Jim McKeown:
Team game programming assignment. 191
Volume 19, Number 4 [2], April 2004
2004 CCSC Central Plains Conference

Katia Passos, Eric Freeman, Cerise Wuthrich, Catherine Stringfellow:
Hidden challenges on teaching web software engineering. 196-202

Catherine Stringfellow, Duane Lee York:
An example of practical component testing. 203-210

H. Paul Haiduk:
C++ templates considered harmful. 211-217

Carol L. Binkerd, John D. Fernandez:
New approaches to advising and mentoring in science and technology. 218-224

Garry L. White, Stanley Stephenson, Ted Halatin:
Employers' preferences for academic letter recommendations from computer information systems graduates. 225-231

Bo Markovic, James T. Wood:
User satisfaction with CBA computer LABS. 232-239

Andrea Hamblin, Cousett Ruelas:
Web accessibility. 240

Bill Walker:
The BAT: a beginner's assembler tutor for the arcane art. 241-245

Krishna K. Agarwal, Achla Agarwal:
Do we need a separate assembly language programming course? 246-251

Timothy J. McGuire:
A simplified message-passing library. 252-256

Tat W. Chan:
A software tool in Java for teaching CPU scheduling. 257-263

Adel M. Abunawass, Barbara Boucher Owens, Laura Baker, Meledath Damodaran, Deborah Whitfield, Frances K. Bailie:
Approaches to self-assessment of computer science departments and programs. 264

Bob Yellin:
The on demand computing paradigm - what it is, why it emerged, and where it's going. 265

Richard P. Simpson, Ranette H. Halverson:
Landscape smoothing of numerical permutation spaces in genetic algorithms. 266-272

Mufid Abudiab, Michael J. Starek, Rene Lumampao, An Nguyen:
Utilization of GIS and graph theory for determination of optimal mailing route. 273-278

Nelson L. Passos, Peng Xue, Hoang Bui:
Instruction level parallelism of non-uniform acyclic loops. 279-286

Ken T. N. Hartness:
Robocode: using games to teach artificial intelligence. 287-291

James W. McGuffee:
Drama in the computer science classroom. 292-298

Gracielo Gonzalez:
Constructivism in an introduction to programming course. 299-305

Daniel D. McCracken:
HCI in the classroom. 306

Mohamad R. Neilforoshan:
Network security architecture. 307-313

Linda S. Grubb, Luis E. Cuéllar:
Survey of network weapons part 1: weapons for profiling. 314-320

Dulal C. Kar:
Network measurement and path characterization using user datagram protocol. 321-328

John D. Fernandez:
A paradigm for community-based human computer interaction education. 329-334

Deborah L. Dunn, Dennis Lingerfelt:
Integrating WebCT into the computer science curriculum. 335-341

Michael Emmett Hardy:
Use and evaluation of the ALEKS interactive tutoring system. 342-347

Ken T. N. Hartness, Brian Culver:
Robocode: a fun way to learn to program. 348

Matt Brock, Eric Jastram, Robert Parkhurst:
Epsim. 349

Eric B. Chapin:
A simple design CAD (SDCAD) program. 349

Rodna L. Mendel, Kelly Reid:
Project Bar-S: redesigning the package labeling system. 350

Gerardo A. Orellano, Cara J. Berry:
Project BAR-S: monitoring and updating work standards systems. 351

Anne Roberts:
Network simulation. 351-352

Lizeth Roque, Robert Burch:
University service projects involving multiple users. 352

Jacob Schrum:
Study and comparison of genetic algorithms when applied to lego mindstorms robots. 353

Ramkrishnan 'Ramki' Sundararaman:
EXDOCS: export documentation system. 353-354

Tia B. Walton:
Tracking task ontology. 354

Brian Culver:
Recommender system for auction sites. 355
Volume 19, Number 5, May 2004
2004 CCSC Northeastern Conference

Fred Martin:
Engaging computing: makin' it real for kids and undergrads. 1

David Gries:
The mathematics of programming and why we should teach it. 2

Richard H. Connelly, Michael B. Gousie, Haldun Hadimioglu, Lubomir Ivanov, Mark Hoffman:
The role of digital logic in the computer science curriculum. 5-8

Mary Dee Medley:
Numerical error in an ethics course. 10-16

Joan Peckham, Trent Batson:
Web development group: an enterprising campus-based internship program for CS majors. 17-24

Joseph Brian Adams, Erica Runkles:
"May we have class outside?": implementing service learning in a CS1 curriculum. 25-34

Ron Coleman, Anil Bhardwaj, Albert Delucca, Gary Finke, Anthony Sofia, Michael Jutt, Sachin Batra:
Microspaces: a compact javaspaces alternative for teaching net-centric computing in Java. 35-43

Michael Olan:
Dr. J vs. the bird: Java IDE's one-on-one. 44-52

Harold H. Smith III:
On tool selection for illustrating the use of UML in system development. 53-63

Kim Bruce, Andrea Danyluk, Thomas P. Murtagh:
Java: an eventful approach. 64-65

Steve Cunningham:
National Science Foundation funding for computer science projects. 66-67

Barbara Zimmerman:
Content and laboratories of a computing science course for non-majors in the 21st Century. 68-77

Clifton Kussmaul:
Software product proposals in a computer science course for non-majors. 78-86

Richard H. Connelly:
Introducing data mining. 87-96

Robert W. McGrail, Tracey Baldwin McGrail:
A grading dilemma or the abyss between sorting and the knapsack problem. 97-107

Amruth N. Kumar, Lawrence D'Antonio, Frank P. Ford, Deborah Knox, Linda M. Wilkens, Richard Wyatt:
Using resources from the web in computer science courses. 108-112

Lawrence D'Antonio, Kathleen Harmeyer, Amruth N. Kumar, Michael Olan, Brad Richards, Rose K. Shumba, Linda M. Wilkens:
Emerging areas in undergraduate computer science education. 113-118

Debra L. Smarkusky, Harold H. Smith III:
Team projects throughout the curriculum: course management, teaching initiatives and outreach. 119-129

GianMario Besana, Lucia Dettori:
Together is better: strengthening the confidence of women in computer science via a learning community. 130-139

John T. Langton, Timothy J. Hickey, Richard Alterman:
Integrating tools and resources: a case study in building educational groupware for collaborative programming. 140-153

James W. Ryder:
Steganography may increase learning everywhere. 154-162

Chuck Leska:
Testing across the curriculum: square one! 163-169

Linda M. Null:
Integrating security across the computer science curriculum. 170-178

Jeanine Meyer:
Virtual pet: an exercise in XML & XSLT. 179-192

Chuck Liang:
Programming language concepts and Perl. 193-204

James E. Heliotis:
Automated laboratory artifact production. 205-213

Mark Hoffman:
An FPGA-based digital logic lab for computer organization and architecture. 214-227

Pierre A. von Kaenel:
Designing and testing a control unit. 228-237

Lubomir Ivanov, John S. Mallozzi:
A hardware/software simulator to unify courses in the computer science curriculum. 238-248

Keith J. Whittington:
Infusing active learning into introductory programming courses. 249-259

Robert McCloud:
Does an online course work in computer science? 260-269

Matthew M. Burke:
Instant messaging and course diaries. 270-274

Victor A. Clincy:
Title: ITGuru - a powerful network simulation environment for teaching and research. 275-276

Seth Dunn:
GIS in hazard mitigation. 277

Melissa Chávez:
Front-end for a RETAIN function. 277-278

Brian Donorfio:
The politics of "free": open source software in government. 279-280

Joy Kamunyori:
Investigating web dynamics. 280-281

Scott Morrison, Sari Hou:
American kestrel (Falco sparverius) GIS research project. 282-284

Scott Richard McCarthy:
Analysis of difference of primes. 284

Vimal Vishwanathan:
Overhead camera implementation for robot colony. 285-287

Bruce Shtelmakher:
Verification of feature-based LTAGS. 287-288

James Keeler:
Graphical implementation of Huffman and arithmetic coders. 289-290

Kevin J. Septor:
Creating a video device application. 291-292

Robert R. Rohrkemper:
Autocorrelation and fourier analysis for detecting periodic cell potentials in a simulated inhibitory neural network. 292-293

William Servos:
Using a genetic algorithm to break Alberti Cipher. 294-295

Robert S. Gray:
Investigation of online interactive systems. 295-296

Rich Bateman:
Training a multi-layer feedforward neural network to play Othello using the backpropogation algorithm and reinforcement learning. 296-297

Michael Marcus:
Image-based search engine. 298-299

Matt Fiedler, Evan Moses, Jeremy Stober:
Dynamic sampling with governed neural networks. 299-300

Michael Massimi, Eric Tarn:
Mathematical models governing dynamic user-driven resource allocation. 300-301

Ross B. Girshick:
Simulating Chinese brush painting: a geometric model. 302-304

Jonathan Kelly, Jennifer Skibitsky, Jay Kenney, Chen Dai, Diza Suleman:
Virtual Chat World (VCW). 304-305

Christopher Hundersmarck, Charles Mancinelli, Michael Martelli:
Viva la brickOS. 305-307

Chia-Li Chang, Benjamin Insler:
Addressing fear of heights through virtual reality. 308-309

Skyler Place:
Visual expectations: a cognitive model of fuzzy decision making. 310

Steve Benz, Robert Grossman:
FavGene 2.0: Perl and MYSQL system for exploring a set of "favorite genes". 311-312

Benjamin Stull:
Teaching wireless networking with limited resources. 312-313

Kyle Horan:
Graphically representing artificial life with Maya programming. 313-314

Mirena S. Chausheva:
Calculating web page trustworthiness by exploring communities on the web. 314-315

Brenda Aldine, Darlene Banta:
Constructing a theoretical machines website: an agile software generation and maintenance experience. 316-317

Jue Wang:
The efficient generation of random programs and their applications. 317-318

Jason Cook:
Application of artificial intelligence to chess playing. 318-319

Ryan Menzer:
Bioinformatics: searching for primers. 320-321

Aaron Archer Waterman, Jessie Burger, Mark Strohmaier:
Application of learned user context to improve web search results. 321-323

Jason Slaunwhite:
Scalable computational methods in quantum field theory. 323-324

Giselle R. Isner:
Looking at you: computer generated graphical - human interaction. 325-327

Ramona Georgescu, Hailu Teklehaimanot:
Robot colony. 328-329

Dessislava Peeva:
Haptic and audio correlation in user interfaces. 329-330

Nikhil Srivastava:
Using logical views and dialogue to answer locally-expressed distributed queries. 331-332

Genevieve Herres:
Real time constructive solid geometry rendering using 3D texture mapping. 333-335

Glen Harmon:
Search engines. 336

Jennifer Carini:
A simulation of quantum logic gates and qubits using Ruby. 337-338

Christopher Cyll:
Cache conscious dynamic memory allocation. 338-340

Chris Sotzing:
A genetic algorithms approach to learning communication and coordination in simulated robots. 340-341

Kai Chen:
DNA-based computation. 341-343

Rachel Noiseux:
Designing and implementing a user-focused web based database system. 343-344

Sara Sinclair:
Adapting Bayesian statistical spam filters to the server side. 344-346

Andrew Beers, Stephan Browarny:
Genealogy database for Butler Area Public Library. 346-347

Stephen D. Gewand, Greta Heissenberger:
The Corona Project: a testing framework for programming contests. 348-349

Matthew Grayson:
A software simulation of an AES-equipped 802.11X wireless network. 349-350

Will MacMillan:
Gracenote Fair-Use jukebox. 350-351

Craig Brubaker:
Earth's tides simulation. 351-352

Mark Schiebel:
Cellular tic tac au-toe-mata. 352

Aydaen Lynch, Darynn Flango, Rob Smith, Matthew Lang:
Experiences of using rational rose/visio for UML modeling in an undergraduate software engineering course: a student perspective. 353-356

Brian Oduor, Andrey S. Anev:
Evolving fuzzy systems. 356-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






