Proceedings of the 34th Annual Midwest Instruction and Computing Symposium

Papers Alphabetical by Author

Author

Title

Alhamamah, Abdullah

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network

Borchert, Otto

Recent Advances in Immersive Virtual Worlds for Education

Carpenter, Donald

Reinforcing Learning in the Data Communications Course Using a Teleprocessing Line Speed Decision Support System

Chihos, Dan

Linux - Is it right for you?

Christen, Rebecca

Enhancing an ATM Simulator

Clawson, Joel

Enhancing an ATM Simulator

Drake, Janet

Grading with a Team

East, Philip

Experience with In-person Grading

Engebretson, Alec

Building Experiences Outside the Computer Classroom Inside the Computer Curriculum

Faux, Rob

The Role of Observation in Computer Science Learning

Faux, Rob

Teaching Problem Solving Techniques and Software Engineering Concepts Before Programming

Flies, Daniel

Building a Classroom Data Warehouse

Gibbons, Thomas

Student Centered Learning in the Introductory Computer Course  

Gray, Paul

Pulling Teeth: Why Advanced Technology is Not Prevalent in the Classroom

Guster, Dennis

Integrating Network Attached Mass Storage Systems into Educational Networks: Performance and Security Issues

Guster, Dennis

The Development of an Intrusion Detection/Defense System for Linux Hosts

Guster, Dennis

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network

Hall, Charles

Integrating Network Attached Mass Storage Systems into Educational Networks: Performance and Security Issues

Harper, Sarah

Distance Learning Experience

Haug, Frank

Tradeoffs and Guidelines for Selecting Technologies to Generate Web Content from Relational Data Stores

Helixon, Tracy

To the Classroom and Beyond: Designing and Implementing an Online Writing Center to Help Students Develop College and Career Writing Skills

Hettiarachchy, Jay

A Global Digital "Sandbox": Can Small College Computer Classes Play in it and How?

Hill, Curt

Evolution of ProgrammingLand

Julstrom, Bryant

The Union-Find Partition in Evolutionary Operators for Spanning Trees Encoded as Lists of Edges

Julstrom, Bryant

A Web-Based Evolutionary Algorithm Demonstration using the Traveling Salesman Problem

Kaiser, Dan

A "Gentler" Introduction to Order Notation and Asymptotic Analysis

Lange, Caroline

Managing Expectations: Suggested Guidelines for Student Development of Software for Non-Programming Staff in the University Setting

Lawal, Banji

The Development of an Intrusion Detection/Defense System for Linux Hosts

Litvinov, Semyon

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network

Lopez, A.

Distance Learning Experience

Lopez, A.

Enhancing an ATM Simulator

Lopez, Dian

Building a Classroom Data Warehouse

Lopez, Dian

Data Mining at the Undergraduate Level

Ludwig, Luke

Data Mining at the Undergraduate Level

Marsh, Ronald

Operating Systems I: An Operating Systems Simulation Developed as Homework

Maurer, W. D.

Computer Solutions of Simultaneous Equations: A Byproduct of the First Programming Course

Meng, Jing

A Reformed Scheme of Teaching Memory Management in Operating System Courses

Morgan, Siobahn

AJJAR - Astronomical Javascript/Java Applet Resource

Mowe, Richard

A Web-Based Evolutionary Algorithm Demonstration using the Traveling Salesman Problem

O'Neil, Thomas

A Graphical 3-SAT Program for Research and Instruction

Podtburg, Stephanie

Simulated Effects Of PGP Encryption On Network Performance

Raasch, Robert

Taking X-ray images to the Web, the process and use in Radiography Education

Rahimi, Saeed

Tradeoffs and Guidelines for Selecting Technologies to Generate Web Content from Relational Data Stores

Reed, David

Developing Empirical Skills in an Introductory Computer Science Course

Robinson, David

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Transmitted Over a Computer Network

Rooney, Dan

To the Classroom and Beyond: Designing and Implementing an Online Writing Center to Help Students Develop College and Career Writing Skills

Sanni, Shakir

Securing Local Area Networks with Firewalls: An Overview of its Application to Windows NT and Unix-Based Networks

Sprafka, Sandy

Internet Videoconferencing - What We've Learned

Sturm, Thomas

Will Robots Destroy Us?: Teaching Students About Technological Implications

TeStrake, YouKyung (Kim)

The Use of Jargon in Software Requirements