Asee peer logo
Displaying all 5 results
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
application features are the restaurant and hotel locators. The e-stadium restaurant locator shown in Figure 2 allows users to search local restaurants by cuisine, restaurant name, city, or driving distance from Purdue's stadium. Each restaurant entry provides a business logo, address, telephone number, website URL, price guideline, driving distance from the stadium, and directions. For those football fans that have traveled to Purdue and plan on staying overnight, the e-Stadium application provides a hotel locator to help them
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
2006-1829: LEVELS OF ABSTRACTION IN DATABASE QUERY DEFINITIONFani Zlatarova, Elizabethtown College Associate Professor of CS, CS Department, Elizabethtown, PA 17022 Page 11.890.1© American Society for Engineering Education, 2006 Levels of Abstraction in Database Query DefinitionAbstractOne of the most challenging steps in the database design and processing is the definition ofqueries. The planning and analysis of systems development are critical for the entire creationprocess. However, real computer-oriented aspects emerge in the design phase. Building up theoptimum structure of an information system will determine the quality of its
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
constrained by the use of simulationapplications and their inherent functional limitations, or by the use of live equipment on-site with its inherent high cost and limited access to students. This paper describes theimplementation of a remote access internetworking laboratory designed for the purposeof improving student learning outcomes through increased access to internetworkinglaboratory equipment. Technical planning, design, and implementation issues areexamined along with the capabilities and limitations of this implementation. Studentfeedback from a pilot course is presented. Advantages and disadvantages of theimplementation are addressed including scheduling of classes, routine maintenance,management of network topologies, and student
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
spam analysis, email spam buster software will be useful for computer forensics,spyware buster software will be useful for operating system security or object oriented softwaredesign, intrusion detection system will be useful for operating system security etc.The evolvement of these security modules into a good courseware and the feedback from thestudents will be the topics for the future papers. The author also plan to cooperate with thecolleagues from ECE department in the college of engineering, Computer Science Department inthe college of science, and Computer Information System department in the college of businessfor the exchange and cooperation of security education modules development.It is also possible that different instructors of
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
Company.Jones, M.D., (1998). The Thinker’s Toolkit: Fourteen Powerful Techniques for Problem Solving,New York: Three Rivers Press. p. 5.Juran, J. M. (1986). The Quality Trilogy: A Universal Approach to Managing Quality, Thispaper was presented at the ASQC 40th Annual Quality Congress in Anaheim, California, May20, 1986. p.2.Kowalkowski, F. F. and McElyea, L., (1996). Enterprise Analysis. Prentice-Hall, Upper SaddleRiver, N.J.Laware, G., (1993). Achieving Business Goals through Information Systems TechnologyHandbook of Information Systems, Boston, MA. Auerbach Publishing, S3-S22.Martin, J., (1990), Information Engineering: Book II Planning and Analysis, Prentice-Hall, Englewood Cliffs, N.J.Merriam-Webster’s Collegiate Dictionary, 11th Edition, Merriam