callback( { "result":{ "query":":facetid:toc:\"db/conf/iticse/iticse2004wgr.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.58" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"35", "@dc":"35", "@oc":"35", "@id":"43410391", "text":":facetid:toc:db/conf/iticse/iticse2004wgr.bht" } }, "hits":{ "@total":"35", "@computed":"35", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"6069735", "info":{"authors":{"author":{"@pid":"17/2285","text":"O. Yu. Bogoyavlenskaya"}},"title":"Teaching networking congestion control.","venue":"ITiCSE-WGR","pages":"35-41","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Bogoyavlenskaya04","doi":"10.1145/1044550.1041653","ee":"https://doi.org/10.1145/1044550.1041653","url":"https://dblp.org/rec/conf/iticse/Bogoyavlenskaya04"}, "url":"URL#6069735" }, { "@score":"1", "@id":"6069738", "info":{"authors":{"author":[{"@pid":"52/3033","text":"Truman Parks Boyer"},{"@pid":"73/5518","text":"Mohsen Chitsaz"}]},"title":"ICE™ and ICE/T™: tools to assist in compiler design and implementation.","venue":"ITiCSE-WGR","pages":"55-57","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/BoyerC04","doi":"10.1145/1044550.1041657","ee":"https://doi.org/10.1145/1044550.1041657","url":"https://dblp.org/rec/conf/iticse/BoyerC04"}, "url":"URL#6069738" }, { "@score":"1", "@id":"6069739", "info":{"authors":{"author":{"@pid":"b/KimBBruce","text":"Kim B. Bruce"}},"title":"Controversy on how to teach CS 1: a discussion on the SIGCSE-members mailing list.","venue":"ITiCSE-WGR","pages":"29-34","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Bruce04","doi":"10.1145/1044550.1041652","ee":"https://doi.org/10.1145/1044550.1041652","url":"https://dblp.org/rec/conf/iticse/Bruce04"}, "url":"URL#6069739" }, { "@score":"1", "@id":"6069740", "info":{"authors":{"author":{"@pid":"88/2061","text":"Robert D. Campbell"}},"title":"IT security and data assurance: a new resource for two-year colleges.","venue":"ITiCSE-WGR","pages":"20","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Campbell04","doi":"10.1145/1044550.1041642","ee":"https://doi.org/10.1145/1044550.1041642","url":"https://dblp.org/rec/conf/iticse/Campbell04"}, "url":"URL#6069740" }, { "@score":"1", "@id":"6069741", "info":{"authors":{"author":[{"@pid":"42/6356","text":"Jim Canning"},{"@pid":"66/1413","text":"William Moloney"},{"@pid":"84/5603","text":"Ali Rafieymehr"},{"@pid":"80/4565","text":"Demetrio Rey"}]},"title":"Reading types in C using the right left walk method.","venue":"ITiCSE-WGR","pages":"52-54","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/CanningMRR04","doi":"10.1145/1044550.1041656","ee":"https://doi.org/10.1145/1044550.1041656","url":"https://dblp.org/rec/conf/iticse/CanningMRR04"}, "url":"URL#6069741" }, { "@score":"1", "@id":"6069748", "info":{"authors":{"author":[{"@pid":"71/1464","text":"Mel Ó Cinnéide"},{"@pid":"t/RichardTynan","text":"Richard Tynan"}]},"title":"A problem-based approach to teaching design patterns.","venue":"ITiCSE-WGR","pages":"80-82","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/CinneideT04","doi":"10.1145/1044550.1041663","ee":"https://doi.org/10.1145/1044550.1041663","url":"https://dblp.org/rec/conf/iticse/CinneideT04"}, "url":"URL#6069748" }, { "@score":"1", "@id":"6069749", "info":{"authors":{"author":{"@pid":"18/6838","text":"Tony Clear"}},"title":"Students becoming political and "incorrect" through agile methods.","venue":"ITiCSE-WGR","pages":"13-15","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Clear04","doi":"10.1145/1044550.1041632","ee":"https://doi.org/10.1145/1044550.1041632","url":"https://dblp.org/rec/conf/iticse/Clear04"}, "url":"URL#6069749" }, { "@score":"1", "@id":"6069766", "info":{"authors":{"author":{"@pid":"52/2872","text":"David Ginat"}},"title":"Helipad.","venue":"ITiCSE-WGR","pages":"25-26","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Ginat04b","doi":"10.1145/1044550.1041648","ee":"https://doi.org/10.1145/1044550.1041648","url":"https://dblp.org/rec/conf/iticse/Ginat04b"}, "url":"URL#6069766" }, { "@score":"1", "@id":"6069768", "info":{"authors":{"author":{"@pid":"86/4236","text":"John T. Gorgone"}},"title":"Information systems and the overview report for computing curricula 2004.","venue":"ITiCSE-WGR","pages":"15-16","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Gorgone04","doi":"10.1145/1044550.1041634","ee":"https://doi.org/10.1145/1044550.1041634","url":"https://dblp.org/rec/conf/iticse/Gorgone04"}, "url":"URL#6069768" }, { "@score":"1", "@id":"6069770", "info":{"authors":{"author":{"@pid":"12/3886","text":"Denis Hamelin"}},"title":"Searching the web to develop inquiry and collaborative skills.","venue":"ITiCSE-WGR","pages":"76-79","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Hamelin04","doi":"10.1145/1044550.1041662","ee":"https://doi.org/10.1145/1044550.1041662","url":"https://dblp.org/rec/conf/iticse/Hamelin04"}, "url":"URL#6069770" }, { "@score":"1", "@id":"6069774", "info":{"authors":{"author":[{"@pid":"h/OritHazzan","text":"Orit Hazzan"},{"@pid":"86/4771","text":"Tami Lapidot"}]},"title":"The practicum in computer science education: bridging gaps between theoretical knowledge and actual performance.","venue":"ITiCSE-WGR","pages":"47-51","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/HazzanL04","doi":"10.1145/1044550.1041655","ee":"https://doi.org/10.1145/1044550.1041655","url":"https://dblp.org/rec/conf/iticse/HazzanL04"}, "url":"URL#6069774" }, { "@score":"1", "@id":"6069776", "info":{"authors":{"author":{"@pid":"07/1965","text":"Peter B. Henderson"}},"title":"Penny piles.","venue":"ITiCSE-WGR","pages":"22-24","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Henderson04","doi":"10.1145/1044550.1041646","ee":"https://doi.org/10.1145/1044550.1041646","url":"https://dblp.org/rec/conf/iticse/Henderson04"}, "url":"URL#6069776" }, { "@score":"1", "@id":"6069778", "info":{"authors":{"author":[{"@pid":"85/6556","text":"Norman Jacobson"},{"@pid":"37/5341","text":"Alex Thornton"}]},"title":"It is time to emphasize arraylists over arrays in Java-based first programming courses.","venue":"ITiCSE-WGR","pages":"88-92","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/JacobsonT04","doi":"10.1145/1044550.1041666","ee":"https://doi.org/10.1145/1044550.1041666","url":"https://dblp.org/rec/conf/iticse/JacobsonT04"}, "url":"URL#6069778" }, { "@score":"1", "@id":"6069787", "info":{"authors":{"author":[{"@pid":"82/2824","text":"Mark D. LeBlanc"},{"@pid":"22/6141","text":"Betsey D. Dyer"}]},"title":"Bioinformatics and computing curricula 2001: why computer science is well positioned in a post-genomic world.","venue":"ITiCSE-WGR","pages":"64-68","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/LeBlancD04","doi":"10.1145/1044550.1041659","ee":"https://doi.org/10.1145/1044550.1041659","url":"https://dblp.org/rec/conf/iticse/LeBlancD04"}, "url":"URL#6069787" }, { "@score":"1", "@id":"6069792", "info":{"authors":{"author":{"@pid":"32/5099","text":"Raymond Lister"}},"title":"A clandestine religious meeting.","venue":"ITiCSE-WGR","pages":"16-17","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Lister04","doi":"10.1145/1044550.1041636","ee":"https://doi.org/10.1145/1044550.1041636","url":"https://dblp.org/rec/conf/iticse/Lister04"}, "url":"URL#6069792" }, { "@score":"1", "@id":"6069793", "info":{"authors":{"author":[{"@pid":"32/5099","text":"Raymond Lister"},{"@pid":"09/1918","text":"Elizabeth S. Adams"},{"@pid":"f/SueFitzgerald","text":"Sue Fitzgerald"},{"@pid":"42/3059","text":"William Fone"},{"@pid":"71/4479","text":"John Hamer"},{"@pid":"19/1235","text":"Morten Lindholm"},{"@pid":"33/2959","text":"Robert McCartney"},{"@pid":"30/313","text":"Jan Erik Moström"},{"@pid":"54/1601","text":"Kate Sanders 0001"},{"@pid":"92/2859","text":"Otto Seppälä"},{"@pid":"17/4774","text":"Beth Simon"},{"@pid":"t/LyndaThomas","text":"Lynda Thomas"}]},"title":"A multi-national study of reading and tracing skills in novice programmers.","venue":"ITiCSE-WGR","pages":"119-150","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/ListerAFFHLMMSS04","doi":"10.1145/1044550.1041673","ee":"https://doi.org/10.1145/1044550.1041673","url":"https://dblp.org/rec/conf/iticse/ListerAFFHLMMSS04"}, "url":"URL#6069793" }, { "@score":"1", "@id":"6069797", "info":{"authors":{"author":{"@pid":"m/CDMartin","text":"C. Dianne Martin"}},"title":"Draw a computer scientist.","venue":"ITiCSE-WGR","pages":"11-12","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Martin04","doi":"10.1145/1044550.1041628","ee":"https://doi.org/10.1145/1044550.1041628","url":"https://dblp.org/rec/conf/iticse/Martin04"}, "url":"URL#6069797" }, { "@score":"1", "@id":"6069798", "info":{"authors":{"author":{"@pid":"92/3625","text":"John Mason"}},"title":"Teaching by analogy: the switch statement.","venue":"ITiCSE-WGR","pages":"105-107","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Mason04","doi":"10.1145/1044550.1041670","ee":"https://doi.org/10.1145/1044550.1041670","url":"https://dblp.org/rec/conf/iticse/Mason04"}, "url":"URL#6069798" }, { "@score":"1", "@id":"6069799", "info":{"authors":{"author":[{"@pid":"53/3184","text":"Victor Matos"},{"@pid":"07/4339","text":"Becky Grasser"}]},"title":"SQL-based discovery of exact and approximate functional dependencies.","venue":"ITiCSE-WGR","pages":"58-63","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/MatosG04","doi":"10.1145/1044550.1041658","ee":"https://doi.org/10.1145/1044550.1041658","url":"https://dblp.org/rec/conf/iticse/MatosG04"}, "url":"URL#6069799" }, { "@score":"1", "@id":"6069800", "info":{"authors":{"author":{"@pid":"95/1652","text":"Renée McCauley"}},"title":"Outgoing links.","venue":"ITiCSE-WGR","pages":"17-18","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/McCauley04","doi":"10.1145/1044550.1041638","ee":"https://doi.org/10.1145/1044550.1041638","url":"https://dblp.org/rec/conf/iticse/McCauley04"}, "url":"URL#6069800" }, { "@score":"1", "@id":"6069802", "info":{"authors":{"author":{"@pid":"17/4532","text":"Eden Miller Medina"}},"title":"Beyond the ballot box: computer science education and social responsibility.","venue":"ITiCSE-WGR","pages":"7-10","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Medina04","doi":"10.1145/1044550.1041626","ee":"https://doi.org/10.1145/1044550.1041626","url":"https://dblp.org/rec/conf/iticse/Medina04"}, "url":"URL#6069802" }, { "@score":"1", "@id":"6069804", "info":{"authors":{"author":[{"@pid":"36/6958","text":"Susan M. Merritt"},{"@pid":"69/6761","text":"Allen Stix"},{"@pid":"64/2341","text":"Judith E. Sullivan"},{"@pid":"53/5624","text":"Fred Grossman"},{"@pid":"08/3096","text":"Charles C. Tappert"},{"@pid":"96/4532","text":"David A. Sachs"}]},"title":"Developing a professional doctorate in computing: a fifth-year assessment.","venue":"ITiCSE-WGR","pages":"42-46","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/MerrittSSGTS04","doi":"10.1145/1044550.1041654","ee":"https://doi.org/10.1145/1044550.1041654","url":"https://dblp.org/rec/conf/iticse/MerrittSSGTS04"}, "url":"URL#6069804" }, { "@score":"1", "@id":"6069808", "info":{"authors":{"author":[{"@pid":"07/4786","text":"Achuthsankar S. Nair"},{"@pid":"90/2723","text":"T. Mahalakshmi"}]},"title":"Conceptualizing data structures: a pedagogic approach.","venue":"ITiCSE-WGR","pages":"97-100","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/NairM04","doi":"10.1145/1044550.1041668","ee":"https://doi.org/10.1145/1044550.1041668","url":"https://dblp.org/rec/conf/iticse/NairM04"}, "url":"URL#6069808" }, { "@score":"1", "@id":"6069815", "info":{"authors":{"author":{"@pid":"07/4734","text":"Nick Parlante"}},"title":"Niftiness.","venue":"ITiCSE-WGR","pages":"26-27","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Parlante04","doi":"10.1145/1044550.1041650","ee":"https://doi.org/10.1145/1044550.1041650","url":"https://dblp.org/rec/conf/iticse/Parlante04"}, "url":"URL#6069815" }, { "@score":"1", "@id":"6069820", "info":{"authors":{"author":{"@pid":"70/814","text":"Nelishia Pillay"}},"title":"A first course in genetic programming.","venue":"ITiCSE-WGR","pages":"93-96","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Pillay04","doi":"10.1145/1044550.1041667","ee":"https://doi.org/10.1145/1044550.1041667","url":"https://dblp.org/rec/conf/iticse/Pillay04"}, "url":"URL#6069820" }, { "@score":"1", "@id":"6069821", "info":{"authors":{"author":{"@pid":"21/1915","text":"Jeffrey Popyack"}},"title":"Banner year for UPE.","venue":"ITiCSE-WGR","pages":"21-22","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Popyack04","doi":"10.1145/1044550.1041644","ee":"https://doi.org/10.1145/1044550.1041644","url":"https://dblp.org/rec/conf/iticse/Popyack04"}, "url":"URL#6069821" }, { "@score":"1", "@id":"6069830", "info":{"authors":{"author":[{"@pid":"60/4642","text":"Timothy J. Rolfe"},{"@pid":"43/1080","text":"Paul W. Purdom"}]},"title":"An alternative problem for backtracking and bounding.","venue":"ITiCSE-WGR","pages":"83-84","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/RolfeP04","doi":"10.1145/1044550.1041664","ee":"https://doi.org/10.1145/1044550.1041664","url":"https://dblp.org/rec/conf/iticse/RolfeP04"}, "url":"URL#6069830" }, { "@score":"1", "@id":"6069833", "info":{"authors":{"author":[{"@pid":"78/6402","text":"Nathan Rountree"},{"@pid":"26/5214","text":"Janet Rountree"},{"@pid":"39/4191","text":"Anthony V. Robins"},{"@pid":"70/1825","text":"Robert Hannah"}]},"title":"Interacting factors that predict success and failure in a CS1 course.","venue":"ITiCSE-WGR","pages":"101-104","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/RountreeRRH04","doi":"10.1145/1044550.1041669","ee":"https://doi.org/10.1145/1044550.1041669","url":"https://dblp.org/rec/conf/iticse/RountreeRRH04"}, "url":"URL#6069833" }, { "@score":"1", "@id":"6069837", "info":{"authors":{"author":{"@pid":"57/3175","text":"Rose K. Shumba"}},"title":"Towards a more effective way of teaching a cybersecurity basics course.","venue":"ITiCSE-WGR","pages":"108-111","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Shumba04","doi":"10.1145/1044550.1041671","ee":"https://doi.org/10.1145/1044550.1041671","url":"https://dblp.org/rec/conf/iticse/Shumba04"}, "url":"URL#6069837" }, { "@score":"1", "@id":"6069847", "info":{"authors":{"author":{"@pid":"w/HenryMacKayWalker","text":"Henry M. Walker"}},"title":"Academic honesty in the classroom.","venue":"ITiCSE-WGR","pages":"18-19","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/iticse/Walker04","doi":"10.1145/1044550.1041640","ee":"https://doi.org/10.1145/1044550.1041640","url":"https://dblp.org/rec/conf/iticse/Walker04"}, "url":"URL#6069847" } ] } } } )