NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Peer reviewed Peer reviewed
Direct linkDirect link
Retalis, Symeon; Georgiakakis, Petros; Dimitriadis, Yannis – Computer Science Education, 2006
Design pattern creation, especially in the e-learning domain, is a highly complex process that has not been sufficiently studied and formalized. In this paper, we propose a systematic pattern development cycle, whose most important aspects focus on reverse engineering of existing systems in order to elicit features that are cross-validated through…
Descriptors: Validated Programs, Instructional Design, Courseware, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Surakka, Sami; Malmi, Lauri – Computer Science Education, 2005
This case study considered the syllabus of the first and second year studies in computer science. The aim of the study was to reveal which topics covered in the syllabi were really needed during the following years of study or in working life. The program that was assessed in the study was a Masters program in computer science and engineering at a…
Descriptors: Masters Programs, Computer Science, Engineering Education, Foreign Countries