- Denning, P., et al, Computing As A Discipline (ACM Task Force on the Core of Computer Science), in Communications of the ACM, January, 1989. Google ScholarDigital Library
- Cigas, J.F., "The Art of the State," in SIGCSE Bulletin, March 1992, volume 24, number 1. Google ScholarDigital Library
- Clancy, M.J. and Linn, M.C., "Case Studies in the Classroom," in SIGCSE Bulletin, March 1992, volume 24, number 1. Google ScholarDigital Library
- Hume, J.N.P. and Holt, R.C., Introduction to Computer Science: Using the TURING Programming Language, 2nd Edition, Holt Software Associates. Google ScholarDigital Library
- Koffman, E.B., Pascal: Problem Solving and Program Design, 4th edition, Addison Wesley, 1992. Google ScholarDigital Library
- Pattis, R.E., "A Philosophy and Example of CS-1 Programming Projects," in SIGCSE Bulletin, February 1990, volume 22, number 1. Google ScholarDigital Library
- Roberg6, J., "Embedding Laboratories within the Computer Science Curriculum," in SIGCSE Bulletin, March 1991, volume 23, number 1. Google ScholarDigital Library
Index Terms
- Emphasizing the process in delivering CS-1
Recommendations
Teaching CS 1: object-first or algorithmic
Before object-oriented techniques were developed, procedural programming languages such as Pascal and C were taught in CS 1 courses. By virtue of the procedural paradigm, the focus of programming was on algorithms. Consequently, teaching methods ...
Process implanting: a new active introspection framework for virtualization
CERIAS '12: Proceedings of the 13th Annual Information Security SymposiumPrevious research on virtual machine introspection proposed "out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "in-the-box" approach, it remains a challenge to obtain a complete ...
Process Implanting: A New Active Introspection Framework for Virtualization
SRDS '11: Proceedings of the 2011 IEEE 30th International Symposium on Reliable Distributed SystemsPrevious research on virtual machine introspection proposed "out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "in-the-box" approach, it remains a challenge to obtain a complete ...
Comments