Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 24 results
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Elsa Q. Villa, University of Texas at El Paso; Ann C. Gates, University of Texas at El Paso; Sanga Kim, University of Texas at El Paso ; David S. Knight, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #31526The CAHSI INCLUDES Alliance: Realizing Collective ImpactDr. Elsa Q. Villa, University of Texas at El Paso Elsa Q. Villa, Ph.D., is a research assistant professor at The University of Texas at El Paso (UTEP) in the College of Education, and is Director of the Center for Education Research and Policy Studies (CERPS). Dr. Villa received her doctoral degree in curriculum and instruction from New Mexico State University; she received a Master of Science degree in Computer Science and a Master of Arts in Education from UTEP. She has led and co-led numerous grants from corporate foundations and state and
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Robin K. Hill, University of Wyoming
Tagged Divisions
Computing and Information Technology
assistance for understanding theories, astheir role is instrumental. Such descriptions must be carefully qualified with the warning thatethics is not actually computable; no mechanical procedure exists for making ethicaldecisions.Normative Theories as Subroutine HeadingsEthical theories sketched as function headings outlne high-level decision procedures suitable forcarrying out by a human agent, with input and output parameters (given as types). An example ofa function heading is the description of Consequentialism (“right and wrong depend onoutcomes”) as a subroutine that produces action-scores as output, given as input both anethical quandary Q and some knowledge of how the world works (to enable the computation ofoutcomes):action-scores
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Mohammad Rafiq Muqri, DeVry University, Ontario, CA
Tagged Divisions
Computing and Information Technology
equation is defined as the order of the highest derivative appearing in the equation and ODE can be of any order. A general form of a first-order ODE can be written in the form dy/dt + p(t)y + q(t) + s = 0 where p(t) and q(t) are functions of t. This equation can be rewritten as shown below d/dt(y) +y p(t) = - q(t) - s where s is zero. A classical integrating factor method can be used for solving this linear differential equation of first order. The integrating factor is e∫p dt . Euler Method Graphical methods produce plots of solutions to first order differential equations of the form y’ = f(x,y), where the derivative appears on the left side of the equation. If an initial condition of the form y(x0) = y0 is also specified, then the only solution
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Caleb James O'Malley, University of Florida; Ashish Aggarwal, University of Florida
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
reduced, allowing for more detailed and interesting findings.3.2.5 Tests for AssumptionsIn order to understand the validity of our data set and the subsequent analysis, a few assumptionsmust first be tested which the factorial ANOVA takes into account. The assumption of normalitywas tested via examination of the residuals. Review of the Shapiro–Wilk (S-W) test fornormality and skewness and kurtosis statistics suggest whether or not normality was a reasonableassumption. The boxplot of the residuals is analyzed for a relatively normal distributional shape.The QQ plot and histogram are also examined for normality. The assumption of homogeneityof variance (homoscedasticity) is tested by conducting Levene’s test.Random assignment of individuals to
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Raja S. Kushalnagar, Gallaudet University; Gary W. Behm, Rochester Institute of Technology; Kevin T. Wolfe; Peter Yeung; Becca Dingman; Shareef Sayel Ali, Center on Access Technology ; Abraham Glasser, Rochester Institute of Technology; Claire Elizabeth Ryan
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Higher Quality Science,” PLoS One, vol. 8, no. 10, p. e79147, Oct. 2013.[11] R. S. Kushalnagar, G. W. Behm, A. W. Kelstone, B. T. Trager, M. R. Weber, S. S. Ali, and J. Lee, “Inclusive Learning through Real-time Tracking Display of Captions,” in 2016 ASEE Annual Conference & Exposition Proceedings, 2016, vol. 2016–June.[12] G. W. Behm, R. S. Kushalnagar, J. S. Stanislow, and A. W. Kelstone, “Enhancing Accessibility of Engineering Lectures for Deaf & Hard of Hearing (DHH): Real-time Tracking Text Displays (RTTD) in Classrooms,” in 2015 ASEE Annual Conference and Exposition Proceedings, 2015, vol. 122nd ASEE, p. 26.657.1-26.657.10.[13] Q. V. Vy and D. I. Fels, “Using Placement and Name for Speaker
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Divisions
Computing and Information Technology
. Hardy D, Puaut I. WCET Analysis of Multi-level Non-inclusive Set-Associative Instruction Caches. IEEE, December, 200810. Srikantaiah S, Kultursay E, Zhang T, Kandemir M, Irwin M.J, Xie Y. MorphCache: A Reconfigurable Adaptive Multi-level Cache hierarchy. IEEE, February, 201111. Kecheng Ji, Ling M, Wang Q, Shi L., Pan J., AFEC An Analytical Framework for Evaluating Cache performance in out of order processors. In 2017 Design, Automation & Test in Europe Conf. & Expo.12. Yavits L., Morad A., Ginosar, Cache Hierarchy Optimization. In IEEE COMPUTER ARCHITECTURE LETTERS, VOL.13, NO. 2, 2014.13. Waldspurger C, Saemundson T., Ahmad I. and Park N., Cache Modeling and Optimization using Miniature Simulations. In 2017 USENIX
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
Tagged Divisions
Computing and Information Technology
opportunityfor schema construction (germane load) is possible. Note that although our model currently showsonly 4 LESs, we expect that this number will increase over time as more pedagogical approachesare integrated.The main objective of the proposed model is through research find the values of a, b, c, d, e, q, r, s,and t in the equations F2FA (aCL + bGA + cPBL + dSI + eLS) and OA(qCL + rGA + sPBL + tSI)that maximizes student learning and engagement. Where F2FA and OA are the face-to-face andonline activities respectively. CL - collaborative learning, GA - gamification, PBL - problem-basedlearning and SI - social interaction are the LESs, and LS - lecture style the traditional approach.You may think of a, b, c, d, e, q, r, s, and t as the percentage of
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jia Zhu, Florida International University; Leila Zahedi, Florida International University; Monique S. Ross, Florida International University
Tagged Divisions
Computing and Information Technology
. Su and P. C. Lee, “Mapping knowledge structure by keyword co-occurrence: a first look at journal papers in technology foresight,” Scientometrics, vol. 85, no. 1, pp. 65–79, 2010. [5] V. Rodrigues, “How to write an effective title and abstract and choose appropriate keywords,” Editage Insights (04-11-2013), 2013. [6] Y. HaCohen-Kerner, “Automatic extraction of keywords from abstracts,” in International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, 2003, pp. 843–849. [7] Y. B. Wu, Q. Li, R. S. Bot, and X. Chen, “Domain-specific keyphrase extraction,” in Proceedings of the 14th ACM international conference on Information and knowledge management, 2005, pp. 283–284. [8] K
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Shahab Boumi, University of Central Florida; Adan Ernesto Vela, University of Central Florida
Tagged Divisions
Computing and Information Technology
enrollmentstrategy have higher educational outcomes compared to students with mixed and part-timeenrollment strategies. In another study, Chen et al. [20] use HMM to categorize students based ontheir learning styles and investigate the relationship between learning style states and learningefficiency in massive open online courses (MOOCS).Hidden Markov Model, like any other Markov Models has a set of states Q = {q1 , q2 , . . . , qN }.However, in HMM, the states’ status are hidden, and the model aims to estimate the states given asequence of observations O = o1 , o2 , . . . , oT with the length of T , where each observation isdrawn from the set of M possible observations V = {v1 , v2 , . . . , vM }. Each Hidden MarkovModel has three parameters: (1) π0 , is
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elena Filatova, City University of New York; Deborah Hecht, Center for Advanced Study in Education
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
work at a college student conference.5. References[1] C. Herreid, "Case Studies in Science: A Novel Method of Science Education.," Journal of Research in Science Teaching, pp. 221-229, 1994.[2] V. Lee, "What is inquiry-guided learning?," New Directions for Teaching and Learning, 2012.[3] J. L. David, "What Research Says About Project-Based Learning," Educational Leadership, pp. 80-82, 2008.[4] R. D. De Veaux, M. Agarwal, M. Averett, B. S. Baumer, A. Bray, T. C. Bressoud, L. Bryant, L. Z. Cheng, A. Francis, R. Gould, A. Y. Kim, M. Kretchmar, Q. Lu, A. Moskol, D. Nolan, R. Pelayo, S. Raleigh , R. Sethi, M. Sondjaja, N. Tiruviluamala, P. X. Uhlig, T. M. Washington, C. L. Wesley, D. White and P. Ye, "Curriculum Guidelines for
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
Tagged Divisions
Computing and Information Technology
review,” Electronics, vol. 9, no. 2, p. 272, 2020.[15] M. Prakash and A. Abdrabou, “On the fidelity of ns-3 simulations of wireless multipath tcp connections,” Sensors, vol. 20, no. 24, p. 7289, 2020.[16] N. Kuse and B. Jaeger, “Network simulation with ns-3,” Network, vol. 67, 2020.[17] N. Jovanovi´c and A. Zaki´c, “Network simulation tools and spectral graph theory in teaching computer network,” Computer Applications in Engineering Education, vol. 26, no. 6, pp. 2084–2091, 2018.[18] Q. Gu, Y. Zhang, and H. Yang, “Application of “computer network teaching platform+ flipped teaching model” in online education-taking “information technology teaching method” as an example,” in International Conference on Machine Learning and Big
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Groza, and S. Bixwas, “Sensor Based Home Automation and Security System”, February 5, 2018 6. H. Huang, S. Xiao, X. Meng, and Y. Xiong, “A Remote Home Security System Based on Wireless Sensor Network and GSM Technology”, February 5, 2018 7. “Safer. Smarter. Z-Wave”, Z-Wave, Silicon Laboratories, http://www.z-wave.com/, February 5, 2018. 8. Blynk. Retrieved April 08, 2018, from http:docs.blynk.cc/ . 9. https://www.geekstips.com/temperature-sensor-dht22-ds18b20-arduino-tutorial/, Accessed on April 2018.10. https://www.google.com/search?q=arduino+light+sensor&safe=active&source=lnms&tb m=shop&sa=X&ved=0ahUKEwiCm43PqLraAhVjx1QKHeIwBpsQ_AUICigB&biw=16 82&bih=921#spd=0, accessed on April
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Merlinda Drini, Queensborough Community College of the City University of New York
Tagged Divisions
Computing and Information Technology
International Conference on Advanced Wireless, Information, and Communication, 2015, pp. Volume 73, 2015, Pages 162-171. [9] T. S Rappaport, Wireless Communications: Principles and Practice.: Prentice Hall , 2002.[10] Merlinda Drini and Tarek Saadawi, "Modeling Wireless Channel for Ad-Hoc Network Routing Protocol," in ISCC Marakech Marocco, 2008, pp. 549-555.[11] Amir Salman Avestimehr, Suhas N. Diggavi, and David N C. Tse, "A Deterministic Model for Wireless Relay Networks and its Capacity," in IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007.[12] Q. Zhang, A. Kassam, and S.A, "Finite-State Markov Model for Rayleigh Fading Channels," IEEE transactions on communications, vol. 47, no. 11, pp. 1688
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Justin Daniel Josey, Robert Morris University; Sushil Acharya, Robert Morris University
Tagged Divisions
Computing and Information Technology
Research Journal of Engineering and Technology, 3(4), pp. 540-545[10]. Murr, M. (2018). Facial Action Coding FAQs. Retrieved from https://socialexploits.com/blog/facial-action-coding-system-faqs/[11]. Lucey, P., Cohn, J. F., Kanade, T., Saragih, J., Ambadar, Z., & Matthews, I. (2010). The extended Cohn–Kanade dataset (CK+): A complete dataset for action unit and emotion- specified expression. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 94–101).[12]. Khademi, M. & Morency, L.-P. (2014). Relative facial action unit detection. In ECCV Workshop on Computer Vision, (pp. 1090–1095).[13]. Ding, X., Chu, W.-S., De la Torre, F., Cohn, J. F., and Wang, Q. (2013). Facial action unit
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
Tagged Divisions
Computing and Information Technology
Application Software Modules”, Zhejiang University, 2016.[10] S. Q. Cheng,“ Dynamic Cooperative Engagement Based on Multiple Agent Software Design andImplementation ,” Xidian University, Xi’an, 2015.[11] H. J. Dai, “The Embedded System Research on Chip Multiprocessor Architecture and Component-Based Software,” Zhejiang University, 2007
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
their internship. The majority of students’ plans centered around their behaviorback at school; we’ll mention one theme that emerged concerning their future job search plans. Many students spoke of how participating in their internships increased their awareness of specializedsub-disciplines within CSE. This new knowledge informed their elective course choices, with studentsmentioning interest in upper-division networking, artificial intelligence and machine learning, databases,web development, security, advanced math and statistics, and more. Some students also planned totake non-CSE classes to round out their education, for example in management, public speaking, or design. TABLE I Q
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Paea LePendu, University of California, Riverside; Cecilia Cheung, University of California, Riverside; Mariam Salloum, University of California, Riverside; Pamela Sheffler, University of California, Riverside; Kelly Downey, University of California, Riverside
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
packed with team building andprofessional development activities. Activities include Skype and in-person alumni talks, industrysite visits and Q&A with engineers, faculty research talks, and a University career center visitwhere staff discusses the college application process, various majors in STEM, alumniconnections and inspirational stories. These features of the camp align with the dimensions ofrelatedness and autonomy in SDT.The code camp was led by a female faculty/lecturer that has extensive experience with teachinglower-level Computer Science courses at the University level. The code camp instruction teamalso included undergraduate student teacher assistants (TAs); two female TAs and one male TA,all of whom were Computer Science
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
Tagged Divisions
Computing and Information Technology
. 3, no. 1, pp. 72-77, 2013.[20] G. Barata, S. Gama, J. Jorge and D. Goncalves, "Engaging Engineering Students with Gamification," in 2013 5th International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES), 2013.[21] F. F. Nah, Q. Zeng, V. R. Telaprolu, A. P. Ayyappa and B. Eschenbrenner, "Gamification of Education: A Review of Literature," in HCI in Business. HCIB 2014. Lecture Notes in Computer Science, 2014.[22] J. Jurado, A. Fernandez and C. Collazos, "Applying gamification in the context of knowledge management," in Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, New York, NY, USA, 2015.[23] M. Reddy, G. Walia and A. D. Radermacher
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
Tagged Divisions
Computing and Information Technology
://www.hornbill.com/campaigns/itil-state/_files/ITIL-State-of-the-Nation-Survey-US.pdf15. Huang, D., & Hu, Q. (2007). Achieving IT-business strategic alignment via enterprise-wide implementation of balanced scorecards. Information Systems Management, 24, 173–184. doi:10.1080/1058053070123931416. Huber, H. (2005, February 7). CEOs and CIOs split on IT success. Computer Weekly. Retrieved from http://www.computerweekly.com/news/2240059805/CEOs-and-CIOs-split-on-IT-success17. Iden, J., & Langeland, L. (2010). Setting the stage for a successful ITIL adoption: A Delphi study of IT experts in the Norwegian Armed Forces. Information Systems Management, 27(2), 103-112. doi:10.1080/1058053100370837818. ITIL Foundation. (2011). ITIL
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, 40(4), 206-209.[8] Simon, B., Kohanfars, M., Lee, J., Tamayo, K., & Cutts, Q. (2010, March). Experience report: peer instruction in introductory computing. In Proceedings of the 41st ACM technical symposium on Computer science education (pp. 341-345). ACM.[9] Nicol, D. J., & Boyle, J. T. (2003). Peer instruction versus class-wide discussion in large classes: a comparison of two interaction methods in the wired classroom. Studies in higher education, 28(4), 457-473.[10] Ramaswamy, S., Harris, I., & Tschirner, U. (2001). Student peer teaching: An innovative approach to instruction in science and engineering education. Journal of science education and technology, 10(2), 165-171.[11] Cortright, R. N., Collins
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Pervasive,” J. Sci. Pract. Comput., vol. 1, no. 2, pp. 67–69, 2007.[2] Q. Bui, “Will Your Job Be Done By A Machine?,” Planet Money - The Economy Explained, 2015. [Online]. Available: http://www.npr.org/sections/money/2015/05/21/408234543/will-your-job-be-done-by-a- machine. [Accessed: 25-May-2015].[3] M. Weisser, “The Computer for the Twenty-First Century,” Sci. Am., vol. 3, no. 265, pp. 94–104, 1991.[4] S. Hambrusch, C. Hoffmann, J. T. Korb, M. Haugan, and A. L. Hosking, “A Multidisciplinary Approach Towards Computational Thinking for Science Majors,” ACM SIGCSE Bull., vol. 41, no. 1, p. 183, Mar. 2009.[5] P. B. Henderson, “Ubiquitous computational thinking,” Computer (Long. Beach. Calif)., vol. 42
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
for Mathematics Identity,” Child Dev., vol. 86, no. 4, pp. 1048–1062, Jul. 2015.[17] C. A. P. Cass, Z. Hazari, J. Cribbs, P. M. Sadler, and G. Sonnert, “Examining the impact of mathematics identity on the choice of engineering careers for male and female students,” in 2011 Frontiers in Education Conference (FIE), 2011, p. F2H–1–F2H–5.[18] J. E. Stets and P. J. Burke, “Identity Theory and Social Identity Theory,” Soc. Psychol. Q., vol. 63, no. 3, p. 224, Sep. 2000.[19] J. E. Stets and R. T. Serpe, “Identity Theory,” Springer, Dordrecht, 2013, pp. 31–60.[20] R. Jenkins, Social identity. Routledge, 2014.[21] E. H. Erikson, “Autobiographic notes on the identity crisis,” Daedalus, 1970.[22] J. P. Gee, “Chapter 3 : Identity
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
/BigDataSE), pp. 1446–1451, IEEE, 2018.[11] S. Sathwara, N. Dutta, and E. Pricop, “Iot forensic a digital investigation framework for iot systems,” in 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1–4, IEEE, 2018.[12] A. MacDermott, T. Baker, and Q. Shi, “Iot forensics: Challenges for the ioa era,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5, IEEE, 2018.[13] G. Dorai, S. Houshmand, and I. Baggili, “I know what you did last summer: your smart home internet of things and your iphone forensically ratting you out,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, pp. 1–10, 2018
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology