About
55
Publications
9,541
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
408
Citations
Introduction
Current institution
Additional affiliations
Education
September 1998 - December 2004
Publications
Publications (55)
The 2023 SIGCSE Technical Symposium has come to a close. Thank you, all 1,554 of you, that joined us in Toronto and online for the first-ever SIGCSE Technical Symposium held outside the United States. We enjoyed welcoming 1,354 of you to Canada in person, as well as an additional 200 of you who registered for online attendance. While we didn't set...
The 2023 SIGCSE Technical Symposium will take place from March 15 - 18, 2023, at the Metro Toronto Convention Centre in Toronto, Canada. We look forward to welcoming you to Canada for the first ever SIGCSE Technical Symposium outside of the United States. The program for the 2023 Technical Symposium is online now. It is a diverse program that showc...
The 2023 Technical Symposium will take place in Toronto, Canada from March 16-18, 2023 at the Metro Toronto Convention Centre. This is the first time that the Technical Symposium has been hosted outside of the United States, though it's not outside the United States by very much - the convention center is only 20 miles from the U.S. border as the c...
The SIGCSE Technical Symposium is SIGCSE's flagship conference and this past March we held SIGCSE's 53nd technical symposium. SIGCSE TS 2022 was held March 3-5, 2022, in Providence, Rhode Island and online. Virtual attendees participated through the Pathable platform. SIGCSE TS 2022 was our first hybrid conference, and it opened with some trepidati...
The 2022 Technical Symposium is scheduled for March 2-5, 2022 at the Rhode Island Convention Center in Providence (RICC), RI, USA, and we are excited to offer the conference for the first time ever in a hybrid modality. The theme is computing education's role in contributing to society's hope for a better future. There are a number of hotels within...
In this feature of the Bulletin, we highlight members of the SIGCSE community. In this issue, Bulletin co-editor Maureen Doyle interviewed Jane Prey. Jane is retired and still very active in the CS Education community.
Declaring a computer science (CS) major at the outset of college and going on to earn a computing degree may be the most direct route to a career in computing, but it is certainly not the only pathway. However, much of the work on pathways to computing careers focuses on those who have taken this traditional route, while less attention has been pai...
In this feature of the Bulletin, we highlight members of the SIGCSE community. In this issue, Bulletin co-editor Maureen Doyle interviewed Paul Tymann, Professor in the B. Thomas Golisano Colelge of Computing and Information Sciences at Rochester Institute of Technology and Senior Member of the ACM.
In this feature of the Bulletin, we highlight members of the SIGCSE community. In this issue, Bulletin co-editor Maureen Doyle interviewed Alison Clear, Associate Professor of Computing at Eastern Institute of Technology in Auckland, New Zealand. Alison recently completed her term on the SIGCSE Board.
In this feature of the Bulletin, we highlight members of the SIGCSE community. In this issue, Bulletin co-editor Maureen Doyle interviewed David Kauchak, outgoing SIGCSE Bulletin co-chair.
The SIGCSE Symposium includes the presentation of SIGCSE's two major awards. The SIGCSE Award for Lifetime Service to the Computer Science Education Community was awarded to Barbara Boucher Owens, Emeritus Faculty from Southwestern University.
In this feature of the Bulletin, we highlight members of the SIGCSE community. In this issue, Bulletin co-editor Maureen Doyle interviewed ACM Outstanding Contribution to Computer Science Education Award winner Jan Cuny, National Science foundation.
The "Hour of Code" was held this year during CS Education week, December 7--13, 2015 and over 198 thousand hour of code events were registered at code.org. Below is a sampling of activities that were done by our SIGCSE members.
We describe and report on a study away course held in the spring of 2015 that brought computer science students from a Midwestern university to visit companies in the Bay Area in California as part of their study of agile software development. While it may be a sufficient goal to offer study away as an encouragement for future participation in stud...
The first SIGCSE Technical Symposium was held 45 years ago on November 16, 1970 at the Astrodome in Houston, Texas. SIGCSE 1970 co-chairs were Dr. Peter Calingaert, at the time teaching for the University of North Carolina at Chapel Hill, and Dr. Edward A. Feustel from Rice University. Peter was responsible for the technical content, and Dr. Robert...
The 'Girls on the Go: The Mobile Computing College Experience' is a residential summer camp whose aim is to encourage female high school students to attend college, to consider computer science as viable major, and to pursue computing related degrees. The camp content is designed primarily around a user-centered design process, with the students ga...
Agile software development methods have been around since the mid 1990s. Over these years, teams have evolved the specific software development practices used. Aims: The goal of this paper is to provide a view of the agile practices used by new teams, and the relationship between the practices used, project outcomes, and the agile principles. Metho...
In this paper, we examine computational thinking and its connections to critical thinking from the perspective of in- formatics. We developed an introductory course for students in our College of Informatics, which includes majors rang- ing from journalism to computer science. The course cov- ered a set of principles of informatics, using both lect...
A Trace Matrix (TM) represents the relationship between software engineering artifacts and is foundational for many software assurance techniques such as criticality analysis. In a large project, a TM might represent the relationships between thousands of elements of dozens of artifacts (for example, between design elements and code elements, betwe...
In this paper, we describe our experience running "Girls on the Go: The Mobile Computing College Experience." We decided to do a residential summer camp for HS-age girls to achieve two goals: to encourage our campers to attend college and to interest them in computer science as a possible career option. We centered the camp around the design of a z...
An early undergraduate research program for rising sophomores and juniors at risk of leaving STEM degree programs is described. Students are paid a stipend to work part-time, at a maximum of twenty hours per week, as part of a research team. Faculty researchers are not financially compensated for working with students. The program successfully brin...
Open source software presents new opportunities for software acquisition but introduces risks. The selection of open source applications should take into account both features and security risks. Risks include security vulnerabilities, of which published vulnerabilities are only the tip of the iceberg. Having an application's source code lets us lo...
Chessboard separation problems are modifications to classic chessboard problems, such as the N queens problem, in which obstacles are placed on the chessboard. The N + k queens problem requires placements of k pawns and N + k mutually non-attacking queens on an N -by-N chessboard. Here we examine centrosymmetric (half-turn symmetric) and doubly cen...
The perspective from which information processing is pervasive in the universe has proven to be an increasingly productive one. Phenomena from the quantum level to social networks have commonalities that can be usefully explicated using principles of informatics. We argue that the notion of scale is particularly salient here. An appreciation of wha...
The perspective from which information processing is pervasive in the universe has proven to be an increasingly productive one. Phenomena from the quantum level to social networks have commonalities that can be usefully explicated using principles of informatics. We argue that the notion of scale is particularly salient here. An appreciation of wha...
The ACM's “Computer Science Curriculum 2008: An Interim Revision of CS 2001” suggests 31 core hours of Software Engineering covering the standard phases of software development. At many universities, including ours, Software Engineering is a capstone course with a semester-long team project. While the course covers the software development lifecycl...
Web applications are increasingly subject to mass attacks, with vulnerabilities found easily in both open source and commercial applications as evinced by the fact that approximately half of reported vulnerabilities are found in web applications. In this paper, we perform an empirical investigation of the evolution of vulnerabilities in fourteen of...
While Java and PHP are two of the most popular languages for open source web applications found at
freshmeat.net
, Java has had a much better security reputation than PHP. In this paper, we examine whether that reputation is deserved. We studied whether the variation in vulnerability density is greater between languages or between different applica...
Many web applications have evolved into complex software ecosystems, consisting of a core maintained by a set of long term developers and a range of plugins developed by third parties. The security of such applications depends as much on vulnerabilities found in plugins as it does in vulnerabilities in the application core. In this paper, we presen...
In 2004 Northern Kentucky University began offering a Bachelor of Science degree in Computer Information Technology. As these new majors began to enroll alongside Computer Science majors in the required and standard Computer Science 1 (CS 1) course, the context of CS 1 shifted. Accordingly, we made curriculum changes to adapt the introductory progr...
In an empirical study of fourteen widely used open source PHP Web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilities/KLOC to 3.30 from Summer 2006 to Summer 2008. Individual web applications varied widely, with vulnerability densities ranging from 0 to 121.4 at the beginning of the s...
Abstract Chessboard separation problems are modiflcations to classic chess- board problems, such as the N Queens Problem, in which obstacles are placed on the chessboard. This paper focuses on a variation known as the N + k Queens Problem, in which k Pawns and N + k mutually non-attacking Queens are to be placed on an N-by-N chess- board. Results a...
Data structures courses have settled on a familiar canon of structures and algorithms, and this is reflected in the standard textbooks. It is often useful for instructors to enliven such courses by presenting data structures that are of more recent interest, ones that may simultaneously challenge students' understanding of algorithms and their skil...
In this paper, we describe projects that engage Hispanic middle-school age students with computing, and cast these projects within the ECC ("Engagement, Capacity, Continuity") framework. Our projects were undertaken in the Midwestern United States, where recent heavy immigration from Latin America has caused rapid demographic shifts. We have conduc...
In this paper, we describe projects that engage Hispanic middle-school age students with computing, and cast these projects within the ECC ("Engagement, Capacity, Continuity") framework. Our projects were undertaken in the Midwestern United States, where recent heavy immigration from Latin America has caused rapid demographic shifts. We have conduc...
In this paper, we describe projects that engage Hispanic middle-school age students with computing, and cast these projects within the ECC ("Engagement, Capacity, Continuity") framework. Our projects were undertaken in the Midwestern United States, where recent heavy immigration from Latin America has caused rapid demographic shifts. We have conduc...
A legal placement of Queens is any placement of Queens on an order N chessboard in which any two attacking Queens can be separated by a Pawn. The Queens independence separation number is the minimum number of Pawns which can be placed on an N × N board to result in a separated board on which a maximum of m independent Queens can be placed. We prove...
This paper describes the impact of a new course in elementary programming on retention and recruitment of technology majors. This new course, elementary programming (EP), was added as a precursor to a computer science course, object oriented programming (OOP), in order to recruit and retain technology majors. This study evaluates the course's effec...
The objective of the DSW project is to investigate the concept of a collaborative workspace. This workspace should allow large communities of users, working at long distances, to collaborate as effectively as if they are in a single room talking face to face and have access to information regardless of its native location around the world. The obje...
Submitted to the Scientific Computing and Computational Mathematics Program. Copyright by the author. Thesis (Ph. D.)--Stanford University, 2004.