405 research outputs found

    Introductory Problem Solving in Computer Science

    Get PDF
    This paper describes our experiences in devising a lightweight, informal methodology for problem solving in introductory, university level, computer science. We first describe the original context of the experiment and the background to the methodology. We then give the details of the steps of the Problem Solving Cycle - Understanding, Designing, Writing and Reviewing - and the lessons we learned about our teaching from devising the material. We also present practical examples of how it has been applied in a variety of units in our programme

    em Where do I begin? A problem solving approach to teaching functional programming

    Get PDF
    This paper introduces a problem solving method for teaching functional programming, based on Polya's `How To Solve It', an introductory investigation of mathematical method. We first present the language independent version, and then show in particular how it applies to the development of programs in Haskell. The method is illustrated by a sequence of examples and a larger case study

    Integration in TwentyOne Search and validation on the EFE Fototeca database

    Get PDF

    Exploring the motivation behind cybersecurity insider threat and proposed research agenda

    Get PDF
    Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments. An overview of the fundamental motivating forces and motivation theory are discussed. Such overview is provided to identify motivations that lead trusted employees to become insider threats in the context of cyber security. A research agenda with two sequential experimental research studies are outlined to address the challenge of insider threat mitigation by a prototype development. The first proposed study will classify data intake feeds, as recognized and weighted by cyber security experts, in an effort to establish predictive analytics of novel correlations of activities that may lead to cyber security incidents. It will also develop approach to identify how user activities can be compared against an established baseline, the user’s network cyber security pulse, with visualization of simulated users’ activities. Additionally, the second study will explain the process of assessing the usability of a developed visualization prototype that intends to present correlated suspicious activities requiring immediate action. Successfully developing the proposed prototype via feeds aggregation and an advanced visualization from the proposed research could assist in the mitigation of malicious insider threat

    The Ontology based FMEA of Lead Free Soldering Process

    Get PDF
    Paper is directed to improvement of a FMEA (Failure Mode and Effects Analysis) procedure in the field of reflow lead free soldering by the use of an ontology paradigm. Some ontology editor tools, suitable for our intention, are presented. Particular phases of ontology utilization for development of more exact approach to the FMEA procedure of reflow lead free soldering are analyzed. A proposal of a user's guide for the FMEA procedure based on an ontology paradigm is presented. This user's guide is included in university courses Management of Production Quality and Complex Quality Control provided by the Department of Electro-Technology
    corecore