- Conference Session
- DB & Information Integration
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
- Tagged Divisions
-
Information Systems
application features are the restaurant and hotel locators. The e-stadium restaurant locator shown in Figure 2 allows users to search local restaurants by cuisine, restaurant name, city, or driving distance from Purdue's stadium. Each restaurant entry provides a business logo, address, telephone number, website URL, price guideline, driving distance from the stadium, and directions. For those football fans that have traveled to Purdue and plan on staying overnight, the e-Stadium application provides a hotel locator to help them
- Conference Session
- Internet and Distributed Computing
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Fani Zlatarova, Elizabethtown College
- Tagged Divisions
-
Information Systems
2006-1829: LEVELS OF ABSTRACTION IN DATABASE QUERY DEFINITIONFani Zlatarova, Elizabethtown College Associate Professor of CS, CS Department, Elizabethtown, PA 17022 Page 11.890.1© American Society for Engineering Education, 2006 Levels of Abstraction in Database Query DefinitionAbstractOne of the most challenging steps in the database design and processing is the definition ofqueries. The planning and analysis of systems development are critical for the entire creationprocess. However, real computer-oriented aspects emerge in the design phase. Building up theoptimum structure of an information system will determine the quality of its
- Conference Session
- Internet and Distributed Computing
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
- Tagged Divisions
-
Information Systems
constrained by the use of simulationapplications and their inherent functional limitations, or by the use of live equipment on-site with its inherent high cost and limited access to students. This paper describes theimplementation of a remote access internetworking laboratory designed for the purposeof improving student learning outcomes through increased access to internetworkinglaboratory equipment. Technical planning, design, and implementation issues areexamined along with the capabilities and limitations of this implementation. Studentfeedback from a pilot course is presented. Advantages and disadvantages of theimplementation are addressed including scheduling of classes, routine maintenance,management of network topologies, and student
- Conference Session
- Security
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
- Tagged Divisions
-
Information Systems
spam analysis, email spam buster software will be useful for computer forensics,spyware buster software will be useful for operating system security or object oriented softwaredesign, intrusion detection system will be useful for operating system security etc.The evolvement of these security modules into a good courseware and the feedback from thestudents will be the topics for the future papers. The author also plan to cooperate with thecolleagues from ECE department in the college of engineering, Computer Science Department inthe college of science, and Computer Information System department in the college of businessfor the exchange and cooperation of security education modules development.It is also possible that different instructors of
- Conference Session
- Computing Curriculum
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
- Tagged Divisions
-
Information Systems
Company.Jones, M.D., (1998). The Thinker’s Toolkit: Fourteen Powerful Techniques for Problem Solving,New York: Three Rivers Press. p. 5.Juran, J. M. (1986). The Quality Trilogy: A Universal Approach to Managing Quality, Thispaper was presented at the ASQC 40th Annual Quality Congress in Anaheim, California, May20, 1986. p.2.Kowalkowski, F. F. and McElyea, L., (1996). Enterprise Analysis. Prentice-Hall, Upper SaddleRiver, N.J.Laware, G., (1993). Achieving Business Goals through Information Systems TechnologyHandbook of Information Systems, Boston, MA. Auerbach Publishing, S3-S22.Martin, J., (1990), Information Engineering: Book II Planning and Analysis, Prentice-Hall, Englewood Cliffs, N.J.Merriam-Webster’s Collegiate Dictionary, 11th Edition, Merriam