Alicia Washington | Duke University (original) (raw)

Papers by Alicia Washington

Research paper thumbnail of Graduating Engineers in the U.S.: Bridging Engineering and Entrepreneurship for African-American High School Students

Research paper thumbnail of Bridging the Divide

In order to increase the computer science pipeline, emphasis must be placed on not only who is ta... more In order to increase the computer science pipeline, emphasis must be placed on not only who is taught, but also how they are taught. Traditional computer science pedagogy has been unsuccessful in attracting, engaging, instructing, and retaining underrepresented students. Culturally-responsive pedagogy must be leveraged to successfully instruct a diverse range of computer science students. With the onset of technologies such as Facebook, iPods, Xbox, smart phones, mobile applications, and more, underrepresented students are already actively engaged in utilizing computer technology. However, in order to transition them from consumers to creators of this technology, culturally-responsive curriculum must teach fundamental concepts such as algorithms, problem solving, and abstraction in the context of issues that affect their daily lives. This workshop is designed to help K-16 computer science educators, professionals, and others understand and identify activities and assignments that infuse culturally-responsive content throughout. By the end of the workshop, participants will have a clear understanding of culturally-responsive pedagogy, its importance in computer science, and how to begin infusing more of it into lessons and activities. Laptops are recommended.

Research paper thumbnail of Call blocking probabilities in a traffic-groomed tandem optical network

Computer Networks, Jun 1, 2004

In this paper, we consider an optical network consisting of N nodes arranged in tandem. We assume... more In this paper, we consider an optical network consisting of N nodes arranged in tandem. We assume traffic grooming, which permits multiple sub-rate traffic streams to be carried on the same wavelength. This optical network is modeled by a tandem queueing network of multirate Erlang loss nodes with simultaneous resource possession, with a view to calculating call blocking probabilities. The queueing network is analyzed by decomposition using a modified version of Courtois' algorithm. Numerical comparisons of the decomposition algorithm against simulation show that the algorithm has good accuracy. Also, it is shown that the proposed algorithm is an improvement over the well-known single-node decomposition algorithm based on the link-independence assumption.

Research paper thumbnail of Featured Research on Equity and Sustained Participation in Engineering, Computing, and Technology

Computing in Science & Engineering, 2020

This special issue presents five invited research articles featuring distinguished contributions ... more This special issue presents five invited research articles featuring distinguished contributions to the Fourth IEEE Special Technical Community on Broadening Participation (STCBP) Conference for Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT 2019). The articles advance our understanding of challenges for and evidence-based approaches to advancing diversity, equity, and inclusion in computing education.

Research paper thumbnail of Identity-Inclusive Computing

Proceedings of the 53rd ACM Technical Symposium on Computer Science Education V. 2, 2022

The issues related to a lack of diversity, equity, and inclusion in computing are, in part, due t... more The issues related to a lack of diversity, equity, and inclusion in computing are, in part, due to a lack of understanding of identity (e.g., race, ethnicity, gender, class, ability, and sexuality), intersectionality, and their impact on both technology consumers and creators from minoritized groups. Identity-inclusive computing (IIC) explores how identity impacts and is impacted by computing. This growing area of research blends social science with computer science to infuse topics related to identity, intersectionality, racism, bias, and discrimination throughout the discipline. IIC has the potential to transform computing to create not only more equitable and inclusive environments for people from diverse identities, but also reduce development of biased/harmful technologies. This transformation requires a community of educators who are working to (un)learn topics related to identity and apply this knowledge to curricula, training, research, policy, and other department initiatives. This Birds of a Feather session convenes educators, advocates, and graduate students to discuss activities and lessons learned from the past year, strategies for beginning/sustaining this work, and future opportunities. The session will directly contribute to a growing community of practice dedicated to creating systemic change across university computing departments worldwide through IIC education, while also providing opportunities for attendees to remain connected outside of SIGCSE

Research paper thumbnail of The Computer Science Attitude and Identity Survey (CSAIS): A Novel Tool for Measuring the Impact of Ethnic Identity in Underrepresented Computer Science Students

2016 ASEE Annual Conference & Exposition Proceedings

Research paper thumbnail of Howard University's Computer Science Education and Cultural Relevance Project

Research paper thumbnail of Epidemic Modeling of Military Networks Using Group and Entity Mobility Models

Fifth International Conference on Information Technology: New Generations (itng 2008), 2008

Page 1. Epidemic Modeling of Military Networks using Group and Entity Mobility Models Temitayo Ol... more Page 1. Epidemic Modeling of Military Networks using Group and Entity Mobility Models Temitayo Olajide and Alicia Nicki Washington Howard University {tolajide, a_n_washington}@howard.edu Abstract Current work in the ...

Research paper thumbnail of Alternate Routing in Tandem Traffic-Groomed Optical Networks

Journal of Networks, 2007

Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to ... more Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. Because these networks carry large amounts of traffic, alternate routing methods are designed in order to allow traffic to be properly rerouted from source to destination in the event of certain events, such as link blocking or failure. In this paper, we consider a tandem traffic-groomed optical network, modeled as a multi-level overflow system, where each level represents a wavelength between adjacent nodes. The queueing network is analyzed using a combination of methods. As will be shown, the decomposition method provides a good approximate analysis of large overflow systems supporting traffic from multiple sources.

Research paper thumbnail of A survey of optical network survivability

Google, Inc. (search). ...

Research paper thumbnail of When Twice as Good Isn't Enough

Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

The commonly documented diversity, equity, and inclusion (DEI) issues in the computing workforce ... more The commonly documented diversity, equity, and inclusion (DEI) issues in the computing workforce are the direct result of corporate cultures that benefit specific groups and marginalize others. This culture usually begins in undergraduate computing departments, where the demographic representation mirrors that of industry. With no formal courses that focus on the nontechnical issues affecting marginalized groups and how to address and eradicate them, students are indirectly taught that the current status quo in computing departments and industry is not only acceptable, but also unproblematic. This directly affects students from marginalized groups (as the reasons for attrition are similar in both higher education and industry), as well as faculty (as biased student evaluations directly affect hiring, promotion, and tenure decisions). This position paper presents the need for cultural competence as a required focus for university computing departments nationwide. By improving these issues before students complete baccalaureate computing degrees, companies will have talent pools that better understand the importance and necessity of DEI and also work to ensure they help foster a more diverse, equitable, and inclusive environment. In addition, more students from marginalized groups will be retained in the major through degree completion.

Research paper thumbnail of RESPECT 2019: Yes, We Still Need to Talk About Diversity in Computing

Computing in Science & Engineering, 2019

Research paper thumbnail of The Opportunistic Routing of the Washington Metropolitan Area Bus System as a Wireless Vehicular Node Simulated Network

Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of ... more Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of solutions for commercial, urban, and metropolitan areas, including emergency response, traffic, and environmental monitoring. In this work, we model buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a network of vehicular nodes equipped with wireless sensors. We developed a network simulation, based on the complete WMATA schedule, to model the network using opportunistic routing strategies. A web-based front-end was developed, using the Google Maps API, to provide a user-friendly display and control of the network map, input parameters, and simulated results. This application will provide users with a simplified method for modifying network parameters to account for a number of parameters and conditions, including simulation run period, starting time, and starting/ending positions.

Research paper thumbnail of The Modeling and Analysis of the Washington Metropolitan Area Bus Network

Int. Conf. on Modeling, Simulation & Visualization Methods, 2010

Research paper thumbnail of ERDR: Achieving Event Reliability in Wireless Sensor Networks Using Distributed Data Redundancy

Research paper thumbnail of The Tricked-Out Virtual Body Shop: Recruiting African- American High-School Students to STEM through Automotive Design

The Tricked-Out Virtual Body Shop is an extrapolation of engineering curriculum design activities... more The Tricked-Out Virtual Body Shop is an extrapolation of engineering curriculum design activities that have successfully engaged African-American students. Declining enrollment among underrepresented African-American students in STEM may be related to negative perceptions of science, technology, engineering, and mathematics (STEM). This concept is designed to directly engage students in constructing a customized virtual automobile, while simultaneously educating them to the science and engineering behind the design and development process.

Research paper thumbnail of A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers

Fifth International Conference on Information Technology: New Generations (itng 2008), 2008

This purpose of this paper is to provide a comparative analysis of three methods used by organiza... more This purpose of this paper is to provide a comparative analysis of three methods used by organizations to prevent malware on client computers. These methods include anti-malware software, patch management, and host-based firewalls. Each method will be briefly described and then compared based on an evaluation of administrative and operational features. This comparative analysis may serve as a useful guide

Research paper thumbnail of Performance Analysis of Homing Pigeon based Delay Tolerant Networks

MILCOM 2007 - IEEE Military Communications Conference, 2007

Abstract This paper presents and analyzes a new type of delay tolerant network where each node ow... more Abstract This paper presents and analyzes a new type of delay tolerant network where each node owns a dedicated messenger (called a pigeon). The only form of inter-node communication is for a pigeon to periodically carry a batch of messages originated at the ...

Research paper thumbnail of Modeling of Military Networks Using Group Mobility Models

2009 Sixth International Conference on Information Technology: New Generations, 2009

Page 1. Modeling of Military Networks using Group Mobility Models Alicia Nicki Washington, Ph.D. ... more Page 1. Modeling of Military Networks using Group Mobility Models Alicia Nicki Washington, Ph.D. and Rotimi Iziduh Howard University a_n_washington@howard. edu, rotimi@yahoo.com Abstract Current work in the area of ...

Research paper thumbnail of Modeling Disruption Tolerant Networks with Random Geographical Barriers

Fifth International Conference on Information Technology: New Generations (itng 2008), 2008

Page 1. Modeling Disruption Tolerant Networks with Random Geographical Barriers Rotimi Iziduh, Lu... more Page 1. Modeling Disruption Tolerant Networks with Random Geographical Barriers Rotimi Iziduh, Lucky Adike, and Alicia Nicki Washington Howard University {riziduh, ladike, a_n_washingto}@howard.edu Abstract In recent ...

Research paper thumbnail of Graduating Engineers in the U.S.: Bridging Engineering and Entrepreneurship for African-American High School Students

Research paper thumbnail of Bridging the Divide

In order to increase the computer science pipeline, emphasis must be placed on not only who is ta... more In order to increase the computer science pipeline, emphasis must be placed on not only who is taught, but also how they are taught. Traditional computer science pedagogy has been unsuccessful in attracting, engaging, instructing, and retaining underrepresented students. Culturally-responsive pedagogy must be leveraged to successfully instruct a diverse range of computer science students. With the onset of technologies such as Facebook, iPods, Xbox, smart phones, mobile applications, and more, underrepresented students are already actively engaged in utilizing computer technology. However, in order to transition them from consumers to creators of this technology, culturally-responsive curriculum must teach fundamental concepts such as algorithms, problem solving, and abstraction in the context of issues that affect their daily lives. This workshop is designed to help K-16 computer science educators, professionals, and others understand and identify activities and assignments that infuse culturally-responsive content throughout. By the end of the workshop, participants will have a clear understanding of culturally-responsive pedagogy, its importance in computer science, and how to begin infusing more of it into lessons and activities. Laptops are recommended.

Research paper thumbnail of Call blocking probabilities in a traffic-groomed tandem optical network

Computer Networks, Jun 1, 2004

In this paper, we consider an optical network consisting of N nodes arranged in tandem. We assume... more In this paper, we consider an optical network consisting of N nodes arranged in tandem. We assume traffic grooming, which permits multiple sub-rate traffic streams to be carried on the same wavelength. This optical network is modeled by a tandem queueing network of multirate Erlang loss nodes with simultaneous resource possession, with a view to calculating call blocking probabilities. The queueing network is analyzed by decomposition using a modified version of Courtois' algorithm. Numerical comparisons of the decomposition algorithm against simulation show that the algorithm has good accuracy. Also, it is shown that the proposed algorithm is an improvement over the well-known single-node decomposition algorithm based on the link-independence assumption.

Research paper thumbnail of Featured Research on Equity and Sustained Participation in Engineering, Computing, and Technology

Computing in Science & Engineering, 2020

This special issue presents five invited research articles featuring distinguished contributions ... more This special issue presents five invited research articles featuring distinguished contributions to the Fourth IEEE Special Technical Community on Broadening Participation (STCBP) Conference for Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT 2019). The articles advance our understanding of challenges for and evidence-based approaches to advancing diversity, equity, and inclusion in computing education.

Research paper thumbnail of Identity-Inclusive Computing

Proceedings of the 53rd ACM Technical Symposium on Computer Science Education V. 2, 2022

The issues related to a lack of diversity, equity, and inclusion in computing are, in part, due t... more The issues related to a lack of diversity, equity, and inclusion in computing are, in part, due to a lack of understanding of identity (e.g., race, ethnicity, gender, class, ability, and sexuality), intersectionality, and their impact on both technology consumers and creators from minoritized groups. Identity-inclusive computing (IIC) explores how identity impacts and is impacted by computing. This growing area of research blends social science with computer science to infuse topics related to identity, intersectionality, racism, bias, and discrimination throughout the discipline. IIC has the potential to transform computing to create not only more equitable and inclusive environments for people from diverse identities, but also reduce development of biased/harmful technologies. This transformation requires a community of educators who are working to (un)learn topics related to identity and apply this knowledge to curricula, training, research, policy, and other department initiatives. This Birds of a Feather session convenes educators, advocates, and graduate students to discuss activities and lessons learned from the past year, strategies for beginning/sustaining this work, and future opportunities. The session will directly contribute to a growing community of practice dedicated to creating systemic change across university computing departments worldwide through IIC education, while also providing opportunities for attendees to remain connected outside of SIGCSE

Research paper thumbnail of The Computer Science Attitude and Identity Survey (CSAIS): A Novel Tool for Measuring the Impact of Ethnic Identity in Underrepresented Computer Science Students

2016 ASEE Annual Conference & Exposition Proceedings

Research paper thumbnail of Howard University's Computer Science Education and Cultural Relevance Project

Research paper thumbnail of Epidemic Modeling of Military Networks Using Group and Entity Mobility Models

Fifth International Conference on Information Technology: New Generations (itng 2008), 2008

Page 1. Epidemic Modeling of Military Networks using Group and Entity Mobility Models Temitayo Ol... more Page 1. Epidemic Modeling of Military Networks using Group and Entity Mobility Models Temitayo Olajide and Alicia Nicki Washington Howard University {tolajide, a_n_washington}@howard.edu Abstract Current work in the ...

Research paper thumbnail of Alternate Routing in Tandem Traffic-Groomed Optical Networks

Journal of Networks, 2007

Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to ... more Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. Because these networks carry large amounts of traffic, alternate routing methods are designed in order to allow traffic to be properly rerouted from source to destination in the event of certain events, such as link blocking or failure. In this paper, we consider a tandem traffic-groomed optical network, modeled as a multi-level overflow system, where each level represents a wavelength between adjacent nodes. The queueing network is analyzed using a combination of methods. As will be shown, the decomposition method provides a good approximate analysis of large overflow systems supporting traffic from multiple sources.

Research paper thumbnail of A survey of optical network survivability

Google, Inc. (search). ...

Research paper thumbnail of When Twice as Good Isn't Enough

Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

The commonly documented diversity, equity, and inclusion (DEI) issues in the computing workforce ... more The commonly documented diversity, equity, and inclusion (DEI) issues in the computing workforce are the direct result of corporate cultures that benefit specific groups and marginalize others. This culture usually begins in undergraduate computing departments, where the demographic representation mirrors that of industry. With no formal courses that focus on the nontechnical issues affecting marginalized groups and how to address and eradicate them, students are indirectly taught that the current status quo in computing departments and industry is not only acceptable, but also unproblematic. This directly affects students from marginalized groups (as the reasons for attrition are similar in both higher education and industry), as well as faculty (as biased student evaluations directly affect hiring, promotion, and tenure decisions). This position paper presents the need for cultural competence as a required focus for university computing departments nationwide. By improving these issues before students complete baccalaureate computing degrees, companies will have talent pools that better understand the importance and necessity of DEI and also work to ensure they help foster a more diverse, equitable, and inclusive environment. In addition, more students from marginalized groups will be retained in the major through degree completion.

Research paper thumbnail of RESPECT 2019: Yes, We Still Need to Talk About Diversity in Computing

Computing in Science & Engineering, 2019

Research paper thumbnail of The Opportunistic Routing of the Washington Metropolitan Area Bus System as a Wireless Vehicular Node Simulated Network

Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of ... more Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of solutions for commercial, urban, and metropolitan areas, including emergency response, traffic, and environmental monitoring. In this work, we model buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a network of vehicular nodes equipped with wireless sensors. We developed a network simulation, based on the complete WMATA schedule, to model the network using opportunistic routing strategies. A web-based front-end was developed, using the Google Maps API, to provide a user-friendly display and control of the network map, input parameters, and simulated results. This application will provide users with a simplified method for modifying network parameters to account for a number of parameters and conditions, including simulation run period, starting time, and starting/ending positions.

Research paper thumbnail of The Modeling and Analysis of the Washington Metropolitan Area Bus Network

Int. Conf. on Modeling, Simulation & Visualization Methods, 2010

Research paper thumbnail of ERDR: Achieving Event Reliability in Wireless Sensor Networks Using Distributed Data Redundancy

Research paper thumbnail of The Tricked-Out Virtual Body Shop: Recruiting African- American High-School Students to STEM through Automotive Design

The Tricked-Out Virtual Body Shop is an extrapolation of engineering curriculum design activities... more The Tricked-Out Virtual Body Shop is an extrapolation of engineering curriculum design activities that have successfully engaged African-American students. Declining enrollment among underrepresented African-American students in STEM may be related to negative perceptions of science, technology, engineering, and mathematics (STEM). This concept is designed to directly engage students in constructing a customized virtual automobile, while simultaneously educating them to the science and engineering behind the design and development process.

Research paper thumbnail of A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers

Fifth International Conference on Information Technology: New Generations (itng 2008), 2008

This purpose of this paper is to provide a comparative analysis of three methods used by organiza... more This purpose of this paper is to provide a comparative analysis of three methods used by organizations to prevent malware on client computers. These methods include anti-malware software, patch management, and host-based firewalls. Each method will be briefly described and then compared based on an evaluation of administrative and operational features. This comparative analysis may serve as a useful guide

Research paper thumbnail of Performance Analysis of Homing Pigeon based Delay Tolerant Networks

MILCOM 2007 - IEEE Military Communications Conference, 2007

Abstract This paper presents and analyzes a new type of delay tolerant network where each node ow... more Abstract This paper presents and analyzes a new type of delay tolerant network where each node owns a dedicated messenger (called a pigeon). The only form of inter-node communication is for a pigeon to periodically carry a batch of messages originated at the ...

Research paper thumbnail of Modeling of Military Networks Using Group Mobility Models

2009 Sixth International Conference on Information Technology: New Generations, 2009

Page 1. Modeling of Military Networks using Group Mobility Models Alicia Nicki Washington, Ph.D. ... more Page 1. Modeling of Military Networks using Group Mobility Models Alicia Nicki Washington, Ph.D. and Rotimi Iziduh Howard University a_n_washington@howard. edu, rotimi@yahoo.com Abstract Current work in the area of ...

Research paper thumbnail of Modeling Disruption Tolerant Networks with Random Geographical Barriers

Fifth International Conference on Information Technology: New Generations (itng 2008), 2008

Page 1. Modeling Disruption Tolerant Networks with Random Geographical Barriers Rotimi Iziduh, Lu... more Page 1. Modeling Disruption Tolerant Networks with Random Geographical Barriers Rotimi Iziduh, Lucky Adike, and Alicia Nicki Washington Howard University {riziduh, ladike, a_n_washingto}@howard.edu Abstract In recent ...