The extensive use of computers and networks for exchange of information has also had ramifications on the growth and spread of crime through their use. Law enforcement agencies need to keep up with the emerging trends...
详细信息
Inoue et al. introduced an automaton on a two-dimensional tape, which decides acceptance or rejection of an input tape by scanning the tape from various sides by various automata which move one way, and investigated t...
详细信息
Automated analysis of object-oriented design models can provide insight into the quality of a given software design. Data obtained from automated analysis, however, is often too complex to be easily understood by a de...
详细信息
In this work, we present two perspectives of Grid computing by using two different Grid middleware as examples: an Enterprise Grid using Xgrid and a Global Grid with Gridbus. We also present the integration of Enterpr...
详细信息
The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two thr...
详细信息
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspac...
详细信息
ISBN:
(纸本)9781604235531
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspaces are set up anew for each new instance of collaboration. We propose that much of the ad-hoc collaboration can be captured and transformed into patterns for reuse in future collaboration. This paper presents the results of the past five years of our work in this area. We introduce the notion of patterns of virtual collaboration;present a framework for extracting patterns of work in virtual workspace systems;and introduce an information model of virtual collaboration. We then present an overview of our data and process mining methods and reverse engineering techniques for discerning work processes carried out through virtual workspace systems. Finally we present our visual mining techniques that we use to discern aspects of work processes in virtual workspaces.
This paper describes an empirical study that investigates the knowledge that computer Science students have about the extent of their own previous learning. The study compares self-generated estimates of performance w...
详细信息
ISBN:
(纸本)1595930248
This paper describes an empirical study that investigates the knowledge that computer Science students have about the extent of their own previous learning. The study compares self-generated estimates of performance with actual performance on a data structures quiz taken by undergraduate students in courses requiring data structures as a pre-requisite. The study is contextualized and grounded within a research paradigm in Psychology called calibration of knowledge that suggests that self-knowledge across a range of disciplines is highly unreliable. Such self-knowledge is important because of its role in meta-cognition, particularly in cognitive self-regulation and monitoring. It is also important because of the credence that faculty give to student self-reports. Our results indicate that computer Science student self-estimates correlate moderately with their performance on a quiz, more so for estimates provided after they have taken the quiz than before. The pedagogical implications are that students should be provided with regular opportunities for empirical validation of their knowledge as well as being taught the metacognitive skills of regular self-testing in order to overcome validation bias. Copyright 2005 ACM.
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a ...
详细信息
As UML statechart diagrams are the core for modeling the dynamic aspects of softwaresystems, we have been studying their understandability for the last three years. In previous researches, we have already studied the...
详细信息
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with ...
详细信息
ISBN:
(纸本)1581139977
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with hundreds of papers on its use in diverse academic fields appearing in the literature (for a comprehensive survey, see [1]). Its use appears to be on the upswing, given the current interest in active learning and teamwork. In computer science, peer review seems to have very broad application. It can be used to evaluate the contributions of various members to a project team;it can be used for design documents and code reviews, in writing assignments, and in capstone project courses. The experience of the panelists is illustrative of the wide range of peer-review practices. This panel will serve to introduce the audience to some of these applications. Since many computer-science instructors have experimented with peer review, we are anxious to have them share their experiences during the open discussion period.
暂无评论