Search For:

Displaying 1-2 out of 2 total
Realities of E-voting Security
Found in: IEEE Security & Privacy
By Michael Shamos,Alec Yasinsac
Issue Date:September 2012
pp. 16-17
There has been substantial debate about e-voting security in the past 10 years. As a result, e-voting has evolved away from lever machines and punched cards, through touchscreen voting machines, to a voter-verifiable paper audit trail phase, and voter-mark...
Plagiarism in computer sciences courses(Panel Discussion)
Found in: Proceedings of the twelfth SIGCSE technical symposium on Computer science education (SIGCSE '81)
By Cynthia Brown, Doris K. Lidtke, Mary Dee Harris Fosberg, Michael Shamos, Philip L. Miller, William Dodrill
Issue Date:February 1981
pp. 26-27
What constitutes cheating on programming assignments? What methods can be used to detect cheating? What should be done with offenders? How can cheating be eliminated in programming courses? These are all pertinent questions, but they are directed more towa...