Journal: ACM SIGCSE Bulletin

Volume 36, Issue 4

7 -- 10Eden Miller Medina. Beyond the ballot box: computer science education and social responsibility
11 -- 12C. Dianne Martin. Draw a computer scientist
12 -- 13Michael R. Williams. Survey calculations
13 -- 15Tony Clear. Students becoming political and incorrect through agile methods
15 -- 16John T. Gorgone. Information systems and the overview report for computing curricula 2004
16 -- 17Raymond Lister. A clandestine religious meeting
17 -- 18Renée McCauley. Outgoing links
18 -- 19Henry MacKay Walker. Academic honesty in the classroom
20 -- 0Robert D. Campbell. IT security and data assurance: a new resource for two-year colleges
21 -- 22Jeffrey L. Popyack. Banner year for UPE
22 -- 24Peter B. Henderson. Penny piles
25 -- 26David Ginat. Helipad
26 -- 27Nick Parlante. Niftiness
29 -- 34Kim B. Bruce. Controversy on how to teach CS 1: a discussion on the SIGCSE-members mailing list
35 -- 41O. Yu. Bogoyavlenskaya. Teaching networking congestion control
42 -- 46Susan M. Merritt, Allen Stix, Judith E. Sullivan, Fred Grossman, Charles C. Tappert, David A. Sachs. Developing a professional doctorate in computing: a fifth-year assessment
47 -- 51Orit Hazzan, Tami Lapidot. The practicum in computer science education: bridging gaps between theoretical knowledge and actual performance
52 -- 54James Canning, William Moloney, Ali Rafieymehr, Demetrio Rey. Reading types in C using the right left walk method
55 -- 57Truman Parks Boyer, Mohsen Chitsaz. ICE™ and ICE/T™: tools to assist in compiler design and implementation
58 -- 63Victor Matos, Becky Grasser. SQL-based discovery of exact and approximate functional dependencies
64 -- 68Mark D. LeBlanc, Betsey D. Dyer. Bioinformatics and computing curricula 2001: why computer science is well positioned in a post-genomic world
69 -- 72Gary N. Walker. Experimentation in the computer programming lab
73 -- 75Elaine Wenderholm. Challenges and the elements of success in undergraduate research
76 -- 79Denis Hamelin. Searching the web to develop inquiry and collaborative skills
80 -- 82Mel Ó Cinnéide, Richard Tynan. A problem-based approach to teaching design patterns
83 -- 84Timothy J. Rolfe, Paul W. Purdom. An alternative problem for backtracking and bounding
88 -- 92Norman Jacobson, Alex Thornton. It is time to emphasize arraylists over arrays in Java-based first programming courses
93 -- 96Nelishia Pillay. A first course in genetic programming
97 -- 100Achuth Sankar S. Nair, T. Mahalakshmi. Conceptualizing data structures: a pedagogic approach
101 -- 104Nathan Rountree, Janet Rountree, Anthony Robins, Robert Hannah. Interacting factors that predict success and failure in a CS1 course
105 -- 107John Mason. Teaching by analogy: the switch statement
108 -- 111Rose Shumba. Towards a more effective way of teaching a cybersecurity basics course
119 -- 150Raymond Lister, Elizabeth S. Adams, Sue Fitzgerald, William Fone, John Hamer, Morten Lindholm, Robert McCartney, Jan Erik Moström, Kate Sanders, Otto Seppälä, Beth Simon, Lynda Thomas. A multi-national study of reading and tracing skills in novice programmers

Volume 36, Issue 2

7 -- 10Wolfgang Coy. Between the disciplines
11 -- 0C. Dianne Martin. Lessons from Chernobyl for IT
11 -- 13Don Gotterbarn. UML and agile methods: in support of irresponsible development
13 -- 14Michael R. Williams. Does anyone remember the KDF-9?
14 -- 15Tony Clear. Software engineering and the academy: uncomfortable bedfellows?
15 -- 17John T. Gorgone. Draft information systems accreditation criteria for 2006
17 -- 18Raymond Lister. Book review: computer science education research
18 -- 19Renée McCauley. Thinking about our teaching
20 -- 21Henry MacKay Walker. What teachers should, can, and cannot do
21 -- 23Robert D. Campbell. Update on two-year college activity
23 -- 24Peter B. Henderson. Modeling mania
24 -- 26David Ginat. On the verge of an empty tank
26 -- 27Nick Parlante. Graphics and Java
29 -- 33David Ginat. Algorithmic patterns and the case of the sliding delta
34 -- 39Michael Huth. Mathematics for the exploration of requirements
40 -- 43G. Michael Schneider. A model for a three course introductory sequence
44 -- 47Alaaeldin A. Aly, Shakil Akhtar. Cryptography and security protocols course for undergraduate IT students
48 -- 51Michael de Raadt, Mark A. Toleman, Richard Watson. Training strategic problem solvers
52 -- 56Dave A. Berque, Ian Serlin, Atanas Vlahov. A brief water excursion: introducing computer organization students to a water driven 1-bit half-adder
57 -- 61Orit Hazzan, Tami Lapidot. Construction of a professional perception in the methods of teaching computer science course
62 -- 63Ranjan Chaudhuri. Teaching bit-level algorithm analysis to the undergraduates in computer science
64 -- 67David Carlson. Teaching computer security
68 -- 71Xuesong Zhang, Ken Surendran, Ming Wang. A computer organization course project: simulation of a modern traffic signal system
72 -- 76Andrew K. Lui, Reggie Kwan, Maria Poon, Yannie H. Y. Cheung. Saving weak programming students: applying constructivism in a first programming course
77 -- 81William H. Friedman. Learning program organization through COBOL
82 -- 86Rachel Or-Bach, Ilana Lavy. Cognitive activities of abstraction in object orientation: an empirical study
87 -- 92Russel E. Bruhn, Judy Camp. Capstone course creates useful business products and corporate-ready students
93 -- 96Nicholas Ourusoff. Reinvigorating the software engineering curriculum with Jackson s methods and ideas
97 -- 100Agustín Cernuda del Río. How ::::not:::: to go about a programming assignment
101 -- 105Thomas G. Hill. Excel grader and access grader