Search For:

Displaying 1-50 out of 50 total
Videoconferencing and presentation support for synchronous distance learning
Found in: Frontiers in Education, Annual
By R. Anderson, J. Beavers, T. VanDeGrift, F. Videon
Issue Date:November 2003
pp. F3F-18
Synchronous distance education can partner students and professors from different geographic or cultural regions, allowing them to share and learn from each other. Technology must support the sharing of ideas and materials. Using an iterative design approa...
 
Studying Native American Culture in an Immersive Virtual Environment
Found in: Advanced Learning Technologies, IEEE International Conference on
By Guy Hokanson, Otto Borchert, Brian M. Slator, Jeff Terpstra, Jeffrey T. Clark, Lisa M. Daniels, Heather R. Anderson, Aaron Bergstrom, Thomas A. Hanson, John Reber, Dan Reetz, Kari L. Weis, Ryan White, Lauren Williams
Issue Date:July 2008
pp. 788-792
On-A-Slant Village was inhabited by the Mandan, a sedentary Native North American Tribe, up until the late18th century. The On-A-Slant
 
Criteria for Project Assignments in Multiple-Project Environments
Found in: Hawaii International Conference on System Sciences
By Peerasit Patanakul, Dragan Z. Milosevic, Timothy R. Anderson
Issue Date:January 2004
pp. 80254b
Project assignment, assigning a project to a project manager, is one of the organization?s most strategically important decisions since it is a determinant of the project performance and the organizational performance. Despite its importance, project assig...
   
Critical questions of engineering students by gender and ethnicity
Found in: 2012 IEEE Frontiers in Education Conference (FIE)
By Armando A. Rodriguez,Mary R. Anderson-Rowland
Issue Date:October 2012
pp. 1-6
Engineering and computer science careers are not well known to the general public. Most students studying these majors also have limited knowledge and information about their chosen area of study. In working with students over many years, the authors have ...
 
Special session -- Not all problems are created equal: From problem-based learning theory to research on complex problem solving and implications for the engineering classroom
Found in: Frontiers in Education, Annual
By O Pierrakos,H Watson,R Kander,J Russell,R Anderson
Issue Date:October 2010
pp. T3A-1-T3A-3
Most of us acknowledge that not all problems are created equal and that different types of problems lead to different learning outcomes for students. For example, it is well-known that undergraduate engineering courses mainly focus on problems that are wel...
 
Supporting classroom discussion with technology: A case study in environmental science
Found in: Frontiers in Education, Annual
By N. Linnell,R. Anderson,J. Fridley,T. Hinckley,V. Razmov
Issue Date:October 2007
pp. F1D-4-F1D-9
This paper describes the fruits of a partnership between two academic departments: offerings of environmental science and resource management courses technologically enhanced with a classroom interaction system developed in the computer science department....
 
Monitoring Vaccine Cold Chains in Developing Countries
Found in: IEEE Pervasive Computing
By R. Chaudhri,G. Borriello,R. Anderson
Issue Date:March 2012
pp. 26-33
FoneAstra is a low-cost mobile-phone-based sensing system for monitoring national vaccine cold chains. In its first pilot deployment, the system successfully diagnosed several issues.
 
Evaluation of a ten year life planning assignment for an Academic Scholarship Success Class
Found in: Frontiers in Education, Annual
By Mary R. Anderson-Rowland
Issue Date:October 2011
pp. F2F-1-F2F-7
In Fall 2010, 98 students in a one-credit Academic Scholarship Success Class were given an assignment to write a life plan for the ten years after their Bachelor of Science or Bachelor of Science in Engineering degree. The students in this class were eithe...
 
Testing of Micrologic Elements
Found in: Managing Requirements Knowledge, International Workshop on
By R. Anderson
Issue Date:May 1961
pp. 75
No summary available.
   
A qualitative evaluation of an Academic Scholarship Program
Found in: Frontiers in Education, Annual
By M R Anderson-Rowland
Issue Date:October 2010
pp. S3C-1-S3C-6
Since fall 2002 Academic Scholarship Programs have been conducted in the Ira A. Fulton Schools of Engineering at Arizona State University. The purpose of the programs is to retain and to graduate the participants, to expand their understanding of the engin...
 
Completeness Results for E-Resolution
Found in: Managing Requirements Knowledge, International Workshop on
By R. Anderson
Issue Date:May 1970
pp. 653
No summary available.
   
Using Brain Imaging to Interpret Student Problem Solving
Found in: IEEE Intelligent Systems
By John R. Anderson,Shawn Betts,Jennifer L. Ferris,Jon M. Fincham,Jian Yang
Issue Date:September 2011
pp. 22-29
Hidden Markov models can be used to combine behavioral and brain-imaging data from an intelligent tutoring system to track mental states during student's problem-solving episodes.
 
Gender differences in freshman engineering students' identification with engineering
Found in: Frontiers in Education, Annual
By O Pierrakos,T K Beam,H Watson,E Thompson,R Anderson
Issue Date:October 2010
pp. S3C-1-S3C-6
Despite a significant increase in efforts to recruit and retain more engineering students through initiatives such as learning communities, mentoring, and pre-college programs, the decline in engineering enrollment continues. Recent research and some of ou...
 
Representing Plankton Functional Types in Ocean General Circulation Models: Competition, Tradeoffs and Self-Organizing Architecture
Found in: Engineering of Complex Computer Systems, IEEE International Conference on
By Thomas R. Anderson, Michael J. Follows
Issue Date:March 2010
pp. 291-295
Progress in marine ecosystem modeling has seen a proliferation of the number of state variables and processes represented, in order to realistically describe system dynamics and feedbacks associated with, for example, changing climate. Assigning realistic ...
 
On the development of a professional identity: engineering persisters vs engineering switchers
Found in: Frontiers in Education, Annual
By O. Pierrakos,T.K. Beam,J. Constantz,A. Johri,R. Anderson
Issue Date:October 2009
pp. 1-6
Decline in engineering enrollment continues and renewed efforts are required to improve enrollment and diversity. Herein, we address this problem by conducting research to understand engineering students through the lens of identity theory. Implications of...
 
Supporting an interactive classroom environment in a cross-cultural course
Found in: Frontiers in Education, Annual
By R. Anderson, Jiangfeng Chen, Luo Jie, Jing Li, Ning Li,N. Linnell,V. Razmov,F. Videon
Issue Date:October 2007
pp. F3D-1-F3D-6
This paper describes a novel offering of a US- based course in Computer Science at a Chinese university. A senior-level Algorithms course from the University of Washington was offered at Beihang University in Beijing, China through Tutored Video Instructio...
 
Specification and Verification of the ASOS Kernel
Found in: Security and Privacy, IEEE Symposium on
By Ben L. Di Vito, Paul H. Palmquist, Eric R. Anderson, Michael L. Johnston
Issue Date:May 1990
pp. 61
The Army Secure Operating System (ASOS) program, under the management of the U.S. Army CECOM organization, is providing a family of operating systems for tactical data system applications in Ada. Two members of the ASOS family have been developed: a Dedica...
 
Data base processor technology
Found in: Managing Requirements Knowledge, International Workshop on
By Donald R. Anderson
Issue Date:June 1976
pp. 811
No summary available.
   
Performance-Based Constraints for Multidimensional Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By James R. Anderson, Seth Abraham
Issue Date:January 2000
pp. 21-35
<p><b>Abstract</b>—A stochastic analysis of multidimensional networks with unidirectional or bidirectional links between nodes is presented. The analysis allows the development of an accurate model for examining the performance and cost t...
 
Multidimensional Network Performance with Unidirectional Links
Found in: Parallel Processing, International Conference on
By James R. Anderson, Seth Abraham
Issue Date:August 1997
pp. 26
A stochastic analysis of multidimensional networks with unidirectional links between nodes is presented, which is more accurate than previous models and valid for the hypercube. The results are reconciled with those of previous researchers who have reporte...
 
Ada?s Suitability for Trusted Computer Systems
Found in: Security and Privacy, IEEE Symposium on
By Eric R. Anderson
Issue Date:April 1985
pp. 184
This paper addresses some of the criticisms that have been leveled against Ada?s stdtabillty for use in trusted computer systems. It treats the use of Ada for both untrusted applications programs and security kernel implementation. (It does not directly ad...
 
Expectations and realities for community college engineering transfers at a large university
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Mary R. Anderson-Rowland
Issue Date:October 2013
pp. 1210-1216
This paper is focused on identifying the factors that worry potential and new transfer students in engineering. Special efforts to help students transfer smoothly into engineering and computer science have been in place since 2002 at Arizona State Universi...
   
Critical support for upper division Transfer Students in engineering and computer science
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Mary R. Anderson-Rowland
Issue Date:October 2013
pp. 1891-1897
A Motivated Engineering Transfer Students (METS) Program at Arizona State University (ASU) was established to aid the transition, retention, and graduation of engineering and computer science community college transfer students. The METS Program provides c...
   
Why Information Security is Hard-An Economic Perspective
Found in: Computer Security Applications Conference, Annual
By R. Anderson
Issue Date:December 2001
pp. 0358
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of crypto-graphic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and bette...
 
Xen worlds: leveraging virtualization in distance education
Found in: Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education (ITiCSE '09)
By Amy K. Joines, Benjamin R. Anderson, Thomas E. Daniels
Issue Date:July 2009
pp. 70-73
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus students, and a desire for high levels of security, drove many of the requirements f...
     
Lightweight annotations for controlling sharing in concurrent data structures
Found in: Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation (PLDI '09)
By David Gay, Mayur Naik, Zachary R. Anderson
Issue Date:June 2009
pp. 1-22
SharC is a recently developed system for checking data-sharing in multithreaded programs. Programmers specify sharing rules (read-only, protected by a lock, etc.) for individual objects, and the SharC compiler enforces these rules using static and dynamic ...
     
Synopsis diffusion for robust aggregation in sensor networks
Found in: Proceedings of the 2nd international conference on Embedded networked sensor systems (SenSys '04)
By Phillip B. Gibbons, Srinivasan Seshan, Suman Nath, Zachary R. Anderson
Issue Date:November 2004
pp. 250-262
Previous approaches for computing duplicate-sensitive aggregates in sensor networks (<i>e.g.</i>, in TAG) have used a tree topology, in order to conserve energy and to avoid double-counting sensor readings. However, a tree topology is not robust ag...
     
Making area-performance tradeoffs at the high level using the AccelFPGA compiler for FPGAs
Found in: Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays (FPGA '03)
By A. Nayak, D. Bagchi, J. Uribe, M. Haldar, N. Tripathi, P. Banerjee, R. Anderson, S. Pal, V. Kim, V. Saxena
Issue Date:February 2003
pp. 237-237
Applications such as digital cell phones, 3G wireless receivers, and voice over IP, require DSP functions that are typically mapped onto general purpose DSP processors. With the introduction of advanced FPGA architectures which provide built-in DSP support...
     
Relational Markov models and their application to adaptive web navigation
Found in: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '02)
By Corin R. Anderson, Daniel S. Weld, Pedro Domingos
Issue Date:July 2002
pp. 143-152
Relational Markov models (RMMs) are a generalization of Markov models where states can be of different types, with each type described by a different set of variables. The domain of each variable can be hierarchically structured, and shrinkage is carried o...
     
Web montage: a dynamic personalized start page
Found in: Proceedings of the eleventh international conference on World Wide Web (WWW '02)
By Corin R. Anderson, Eric Horvitz
Issue Date:May 2002
pp. 704-712
Despite the connotation of the words "browsing" and "surfing," web usage often follows routine patterns of access. However, few mechanisms exist to assist users with these routine tasks; bookmarks or portal sites must be maintained manually and are insensi...
     
Crossing the bridge while you build it: a smooth migration to new servers and services
Found in: Proceedings of the 29th annual ACM SIGUCCS conference on User services (SIGUCCS '01)
By Christopher Jones, Kathy Pribbenow, Larry Fields, Thelma Simons, Wlliam R. Anderson
Issue Date:October 2001
pp. 3-7
This paper accompanies a panel discussion by members of the computing support staff at Georgetown University, The University of Kansas, and The University of Oregon. Each school migrated its customers to a new e-mail system; some of the migrations included...
     
Personalizing web sites for mobile users
Found in: Proceedings of the tenth international conference on World Wide Web (WWW '01)
By Corin R. Anderson, Daniel S. Weld, Pedro Domingos
Issue Date:May 2001
pp. 565-575
This paper describes the challenges faced by designers in creating accessible systems for the elderly. CARSE, an assessment tool, which has been synthesized and empirically validated of the semantic efficacy of interface metaphor, is used to evaluate two s...
     
What can a mouse cursor tell us more?: correlation of eye/mouse movements on web browsing
Found in: CHI '01 extended abstracts on Human factors in computer systems (CHI '01)
By John R. Anderson, Mon Chu Chen, Myeong Ho Sohn
Issue Date:March 2001
pp. 281-282
In this paper, we describe a study on the relationship between gaze position and cursor position on a computer screen during web browsing. Users were asked to browse several web sites while their eye/mouse movements were recorded. The data suggest that the...
     
Locus of feedback control in computer-based tutoring: impact on learning rate, achievement and attitudes
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems (CHI '01)
By Albert T. Corbett, John R. Anderson
Issue Date:March 2001
pp. 245-252
The advent of second-generation intelligent computer tutors raises an important instructional design question: when should tutorial advice be presented in problem solving? This paper examines four feedback conditions in the ACT Programming Tutor. Three ver...
     
Intelligent gaze-added interfaces
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems (CHI '00)
By Dario D. Salvucci, John R. Anderson
Issue Date:April 2000
pp. 273-280
We discuss a novel type of interface, the intelligent gaze-added interface, and describe the design and evaluation of a sample gaze-added operating-system interface. Gaze-added interfaces, like current gaze-based systems, allow users to execute commands us...
     
Eye tracking the visual search of click-down menus
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit (CHI '99)
By John R. Anderson, Michael D. Byrne, Michael Matessa, Scott Douglass
Issue Date:May 1999
pp. 402-409
We present an approach to control information flow in object-oriented systems. The decision of whether an informatin flow is permitted or denied depends on both the authorizations specified on the objects and the process by which information is obtained an...
     
A coarse-grained FPGA architecture for high-performance FIR filtering
Found in: Proceedings of the 1998 ACM/SIGDA sixth international symposium on Field programmable gate arrays (FPGA '98)
By James R. Anderson, Kaushik Roy, Siddharth Sheth
Issue Date:February 1998
pp. 234-244
This paper introduces a coarse-grained FPGA architecture that is specialized for high-performance Finite Impulse Response (FIR) filtering. The proposed architecture provides the flexibility of a DSP processor with performance and area efficiency similar to...
     
digital Smoke
Found in: ACM SIGGRAPH 97 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH '97 (SIGGRAPH '97)
By John R. Anderson
Issue Date:August 1997
pp. 249
This paper describes a physically-based rendering system tailored to the demands of lighting design and architecture. The simulation uses a light-backwards ray-tracing method with extensions to efficiently solve the rendering equation under most conditions...
     
The paragon performance monitoring environment
Found in: Proceedings of the 1993 ACM/IEEE conference on Supercomputing (Supercomputing '93)
By B. Ries, D. Breazeal, E. Richards, K. Callaghan, R. Anderson, W. Auld, W. Smith
Issue Date:December 1993
pp. 850-859
This paper discusses scalability and outlines a specific approach to measuring the scalability of parallel computer systems. The relationship between scalability and speedup is described. It is shown that a parallel system is scalable for a given algorithm...
     
Hierarchical rapid modeling of picture archiving and communication systems using LANNET II.5 and NETWORK II.5
Found in: Proceedings of the 24th conference on Winter simulation (WSC '92)
By Emil Wirsz, Fred W. Prior, Glenn A. Meredith, Kenneth R. Anderson
Issue Date:December 1992
pp. 1356-1364
This paper describes the CONVERSIM simulation language. CONVERSIM is a developmental general-purpose, discrete-event language which has been used in the classroom to introduce the use and operation of simulators prior to the introduction of languages such ...
     
Rapid modeling: in the design of a new PCB manufacturing system
Found in: Proceedings of the 21st conference on Winter simulation (WSC '89)
By G. W. Diehl, K. R. Anderson
Issue Date:December 1989
pp. 818-826
This paper describes the CONVERSIM simulation language. CONVERSIM is a developmental general-purpose, discrete-event language which has been used in the classroom to introduce the use and operation of simulators prior to the introduction of languages such ...
     
Rapid modeling: implications for business planning
Found in: Proceedings of the 20th conference on Winter simulation (WSC '88)
By Gregory W. Diehl, Kenneth R. Anderson
Issue Date:December 1988
pp. 691-696
The ability to quickly model the production implications of a product for the marketing, sales, finance, or engineering functions of the enterprise, takes the manufacturing function into a strategic planning role. Rapid modeling can play a significant role...
     
A method for planning analysis and design simulation of CIM systems
Found in: Proceedings of the 19th conference on Winter simulation (WSC '87)
By Kenneth R. Anderson
Issue Date:December 1987
pp. 715-720
Analytic models (AM) that combine a network of queues with resource reliability parameters are currently being applied to strategic planning analysis and design simulation of manufacturing systems. These models estimate the dynamic interaction between reso...
     
A random NC algorithm for depth first search
Found in: Proceedings of the nineteenth annual ACM conference on Theory of computing (STOC '87)
By A. Aggarwal, R. Anderson
Issue Date:January 1987
pp. 325-334
In this paper we present a fast parallel algorithm for constructing a depth first search tree for an undirected graph. The algorithm is an RNC algorithm, meaning that it is a probabilistic algorithm that runs in polylog time using a polynomial number of pr...
     
The automated tutoring of introductory computer programming
Found in: Communications of the ACM
By E. Skwarecki, J. R Anderson
Issue Date:September 1986
pp. 842-849
The methodologies of artificial intelligence and the knowledge of cognitive psychology can be used to automatically generate fine-grain tutorial interactions, rather than having to program them manually.
     
A parallel algorithm for the maximal path problem
Found in: Proceedings of the seventeenth annual ACM symposium on Theory of computing (STOC '85)
By R Anderson
Issue Date:May 1985
pp. 33-37
The two-processor scheduling problem is perhaps the most basic problem in scheduling theory, and several efficient algorithms have been discovered for it. However, these algorithms are inherently sequential in nature. We give a fast parallel (R-NC) algorit...
     
Simulation of sequential production systems with in-process inventory
Found in: Proceedings of the 6th conference on Winter simulation (WSC '73)
By Brian D. Sellers, David R. Anderson, Mohammed M. Shamma
Issue Date:January 1973
pp. 85-92
This paper presents simulation results from a general sequential production system. The results are used to establish the effect of service time variability and to estimate minimum cost-in process inventory capacities.
     
Inventory and distribution models
Found in: Proceedings of the 6th conference on Winter simulation (WSC '73)
By Brian D. Sellers, David R. Anderson, Donald A. Heimburger, Ernest Koenigsbert, Kailash M. Bafna, Lynn E. Bussey, M. Palmer Terrell, Roland Young
Issue Date:January 1973
pp. 84
Inventory control is one of the “classical” problems areas for quantitative analysis. Inventory and distribution systems have been subjected to analysis using simulation since the advent of medium size computers. In this session the emphasis is...
     
Mapping multidimensional space to one dimension for computer output display
Found in: Proceedings of the 1968 23rd ACM national conference
By D. R. Anderson, E. A. Patrick, F. K. Bechtel
Issue Date:January 1968
pp. 511-515
Consider the problem of displaying a real-valued function f(x1,x2,...,xl) of l real variables on a computer output display. Actually the displayed function must be an approximated version of f because of the computer's finite storage capability. If l &equi...
     
Ferro electric-materials as storage elements for digital computers and switching systems
Found in: Proceedings of the 1952 ACM national meeting (Toronto) (ACM '52)
By J. R. Anderson
Issue Date:June 1952
pp. 81
The growing need for improved types of data storage systems in both the digital computer and telephone switching fields has led to the investigation of ferroelectric materials as memory devices. Among the objectives in developing these devices have been lo...
     
 1