ConferenceRespect 2025 Proceedings of the 2025 Conference for Research on Equitable and Sustained Participation in Engineering Computing and Technology · July 14, 2025
Accessibility in computer science (CS) education demands collective action, yet little research examines how collective impact partnerships can effectively embed accessibility practices. Drawing on a four-year partnership of the Alliance for Interdisciplin ...
Full textCite
ConferenceRespect 2025 Proceedings of the 2025 Conference for Research on Equitable and Sustained Participation in Engineering Computing and Technology · July 14, 2025
Accessibility remains insufficiently integrated in computer science (CS) education, despite its recognized importance. This paper examines how the 3C Fellows Program, a two-year professional development program, facilitated and supported the incorporation ...
Full textCite
ConferenceSIGCSE 2023 Proceedings of the 54th ACM Technical Symposium on Computer Science Education · March 6, 2023
Computing has been historically taught as neutral and devoid of any connection with societies. But more recently, technical tools are taking center stage at societal problem solving, influencing policies and practices around issues such as surveillance, pr ...
Full textCite
ConferenceSIGCSE 2021 Proceedings of the 52nd ACM Technical Symposium on Computer Science Education · March 3, 2021
Navigating the intersection of both race and gender can be difficult for Black women in academia, especially when they lack representation, and proper support, which forces many to "learn on the fly."This panel convenes Black women in diverse faculty posit ...
Full textCite
ConferenceSIGCSE 2021 Proceedings of the 52nd ACM Technical Symposium on Computer Science Education · March 3, 2021
The CS-Ed Podcast's theme for season 2 is "Where should we go from here?"Three of the episodes focused on equity. This panel consists of all the podcast guests that spoke on this topic and the podcast host will serve as the moderator. In their episode, eac ...
Full textCite
ConferenceSIGCSE 2021 Proceedings of the 52nd ACM Technical Symposium on Computer Science Education · March 3, 2021
It is often assumed that women in CS fully understand and appreciate diversity, equity, and inclusion and advocate for the needs of all women. However, there exist highly publicized examples in computing and beyond where the intersection of race and gender ...
Full textCite
Journal ArticleComputing in Science and Engineering · September 1, 2020
This special issue presents five invited research articles featuring distinguished contributions to the Fourth IEEE Special Technical Community on Broadening Participation (STCBP) Conference for Research on Equity and Sustained Participation in Engineering ...
Full textCite
Journal Article2020 Research on Equity and Sustained Participation in Engineering Computing and Technology Respect 2020 Proceedings · March 10, 2020Full textCite
Book · September 15, 2018
In Unapologetically dope, Dr. Nicki Washington shares her lessons learned from childhood to adulthood on how to remain your most authentic self while still succeeding in a field where less than 1% of all graduates are Black women. ...
Cite
ConferenceASEE Annual Conference and Exposition Conference Proceedings · June 26, 2016
As computer science continues to permeate every aspect of society, the number of students of color adequately prepared for, choosing to pursue, and successfully completing computer science (CS) undergraduate programs is still dismal. CS education research ...
Cite
ConferenceSIGCSE 2015 Proceedings of the 46th ACM Technical Symposium on Computer Science Education · February 24, 2015
While computer science (CS) continues to permeate every aspect of society, the number of high-school students that are adequately prepared to enroll in university computer science programs is declining. To address the nation's needs it is clear that the re ...
Full textCite
Journal ArticleInternational Journal of Computer Aided Engineering and Technology · January 1, 2010
The popularity of mobile phones and the internet makes it more enticing for hackers to write viruses and create malicious code. There are currently over 150 mobile viruses today and the prevalence of mobile viruses in the US is currently at its tipping poi ...
Full textCite
ConferenceItng 2009 6th International Conference on Information Technology New Generations · December 1, 2009
Current work in the area of DTN focuses on various forms of epidemic routing, similar to mathematical epidemiology. In as much as this research has pioneered the field, it has left a large amount of open areas of research. Particularly, the use of group mo ...
Full textCite
ConferenceProceedings of the 2008 International Conference on Modeling Simulation and Visualization Methods Msv 2008 · December 1, 2008
The popularity of mobile phones and the Internet makes it more enticing for hackers to write viruses and create malicious code. There are currently over 150 mobile viruses today. As a result, the mobile viruses in the US are currently at its tipping point. ...
Cite
ConferenceProceedings International Conference on Information Technology New Generations Itng 2008 · May 27, 2008
Current work in the area of disruption-tolerant networks (DTN) focuses on various forms of epidemic routing, similar to mathematical epidemiology. In as much as this research has pioneered the field, it has left a large amount of open areas of research. Pa ...
Full textCite
ConferenceProceedings International Conference on Information Technology New Generations Itng 2008 · May 27, 2008
In recent years, the need for increased connectivity has extended from urbanized areas to locations previously unreachable via standard telecommunication networks. As a result, packet transmission occurs in a store-and-forward fashion, where nodes relay pa ...
Full textCite
ConferenceProceedings International Conference on Information Technology New Generations Itng 2008 · May 27, 2008
This purpose of this paper is to provide a comparative analysis of three methods used by organizations to prevent malware on client computers. These methods include anti-malware software, patch management, and host-based firewalls. Each method will be brie ...
Full textCite
ConferenceProceedings IEEE Military Communications Conference MILCOM · December 1, 2007
This paper presents and analyzes a new type of delay tolerant network where each node owns a dedicated messenger (called a pigeon). The only form of inter-node communication is for a pigeon to periodically carry a batch of messages originated at the home n ...
Full textCite
ConferenceProceedings International Conference on Information Technology New Generations Itng 2007 · August 28, 2007
Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the everincreasing demands of the Internet. Because these networks carry large amounts of traffic, alternate routing methods are designed in order to allow tra ...
Full textCite
Journal ArticleJournal of Networks · January 1, 2007
Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. Because these networks carry large amounts of traffic, alternate routing methods are designed in order to allow tr ...
Full textCite
ConferenceLecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics · January 1, 2007
Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. In a wavelength-routed optical network, traffic is transported over lightpaths, which exclusively occupy an entire ...
Full textCite
ConferenceProceedings Simulation Symposium · November 10, 2005
We consider a traffic-groomed optical network consisting of N nodes arranged in tandem. This optical network is modeled by a tandem queueing network of multi-rate loss queues with simultaneous resource possession. Two approximation methods are proposed for ...
Cite
ConferenceComputer Networks · June 21, 2004
In this paper, we consider an optical network consisting of N nodes arranged in tandem. We assume traffic grooming, which permits multiple sub-rate traffic streams to be carried on the same wavelength. This optical network is modeled by a tandem queueing n ...
Full textCite