Abstract is missing.
- Prospects & practices for end-user development activities in business computing educationUmar Ruhi. 1-2 [doi]
- A virtualized testbed with physical outlets for hands-on computer networking educationMark Schmidt, Florian Heimgaertner, Michael Menth. 3-8 [doi]
- Teaching a networking class for freshmen: course design and lessons learnedYang Wang, Thomas Blum, Margaret McCoey. 9-14 [doi]
- FLaSKU - a classroom experience with teaching computer networking: is it useful to others in the field?Shan Suthaharan. 15-20 [doi]
- Analysis of source code snapshot granularity levelsArto Vihavainen, Matti Luukkainen, Petri Ihantola. 21-26 [doi]
- An analysis of team performance in high school programming contestsStoney Jackson, Heidi J. C. Ellis, Robert Crouse. 27-32 [doi]
- Automatically detectable indicators of programming assignment difficultyPetri Ihantola, Juha Sorva, Arto Vihavainen. 33-38 [doi]
- Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approachZouheir Trabelsi. 39-44 [doi]
- Bottleneck analysis with NetKit: teaching information security with hands-on labsSvetlana Peltsverger, Chi Zhang. 45-50 [doi]
- Curricular and performance measurement challenges in cloud environmentsBruce Hartpence. 51-54 [doi]
- Capstone experience: achieving success with an undergraduate research group in speechMichael Jonas. 55-60 [doi]
- The evolution of information technology Capstone projects into research projectsSusan M. Chard, Brenda Lloyd. 61-64 [doi]
- Student initiated capstone projectsAlan Fedoruk, Mingwei Gong, Michael McCarthy. 65-70 [doi]
- The critical role of profiles in social e-learning designLei Shi, Alexandra I. Cristea, Suncica Hadzidedic. 71-76 [doi]
- Improving student success through personalization and customizationRichard Halstead-Nussloch, Jon A. Preston, Han Reichgelt. 77-80 [doi]
- A methodology for personalized competency-based learning in undergraduate coursesIoulia Rytikova, Mihai Boicu. 81-86 [doi]
- Answering the question: "Where can I work after I graduate?"Sandra Gorka, Jacob R. Miller. 87-88 [doi]
- Industry partnerships to support computer science high school teachers' pedagogical content knowledgeAleata Hubbard, Yvonne Kao. 89-90 [doi]
- Streamlining courses for the web development concentration of an IT bachelor degree programXing Liu. 91-92 [doi]
- What is the next big thing?: fulbright's half-life theoryRon Fulbright. 93-94 [doi]
- Learning within a professional environment: shared ownership of an HFOSS projectHeidi J. C. Ellis, Stoney Jackson, Darci Burdge, Lori Postner, Gregory W. Hislop, Joanie Diggs. 95-100 [doi]
- Research skills for software engineering undergraduates in dutch universities of applied sciencesMortaza S. Bargh, Annette van Rooij-Peiman, Leo Remijn, Sunil Choenni. 101-108 [doi]
- Meaningful assessmentGeoff Stoker, Jean R. S. Blair, Edward Sobiesk. 109-114 [doi]
- Formulating second-order logic conditions in SQLJalal Kawash. 115-120 [doi]
- The practical application of LEGO® MINDSTORMS® robotics kits: does it enhance undergraduate computing students' engagement in learning the Java programming language?Ethan Tsang, Collette Gavan, Mark Anderson. 121-126 [doi]
- Using android as a platform for programming in the IT curriculumMichael Halper. 127-132 [doi]
- Using mobile apps to support novice programming studentsSonal Dekhane, Cynthia Johnson. 133-134 [doi]
- Operation Java blitz: extracurricular programming workshops to engage it studentsEvelyn Brannock, Nannette P. Napier, Robert Lutz. 135-136 [doi]
- ACM associate-degree IT curricular guidanceElizabeth K. Hawthorne, Cara Tang, Cindy S. Tucker, Robert D. Campbell. 137-138 [doi]
- Success factors and challenges for IT capstone projectsJack Zheng, Chi Zhang, Lei Li. 139-140 [doi]
- Designing a graduate program in information security and analytics: masters program in information security and analytics (MISA)Sathish Alampalayam Kumar. 141-146 [doi]
- Design of an analytic centric MS degree in information sciences and technologiesJai W. Kang, Edward P. Holden, Qi Yu. 147-152 [doi]
- Implementing a living-learning community in information technologySandra Gorka, Matthew Helf, Jacob R. Miller. 153-158 [doi]
- Guiding students to discover concepts and develop process skills with POGILClif Kussmaul. 159-160 [doi]
- The experiences and challenges in setting up a mobile computing trackBecky Rutherfoord, Jon A. Preston, Jack Zheng, Ming Yang. 161-162 [doi]
- An academic profile of IT faculty in the USABarry M. Lunt, Bill Paterson. 163-166 [doi]
- A longitudinal examination of SIGITE conference submission data, 2007-2012Randy Connolly, Janet Miller, Rob Friedman. 167-172 [doi]
- Factors affecting school choice of computing studentsRex Perez Bringula, John Noel C. Victorino. 173-178 [doi]