Search results for "Computers"
showing 10 items of 3243 documents
How to Improve the Reliability of Chord?
2008
In this paper we focus on Chord P2P protocol and we study the process of unexpected departures of nodes from this system. Each of such departures may effect in losing any information and in classical versions of this protocol the probability of losing some information is proportional to the quantity of information put into this system. This effect can be partially solved by gathering in the protocol multiple copies (replicas) of information. The replication mechanism was proposed by many authors. We present a detailed analysis of one variant of blind replication and show that this solution only partially solves the problem. Next we propose two less obvious modifications of the Chord protoco…
Measuring Distraction at the Levels of Tactical and Strategic Control: The Limits of Capacity-Based Measures for Revealing Unsafe Visual Sampling Mod…
2011
The control theory of driving suggests that driver distraction can be analyzed as a breakdown of control at three levels. Common approach for analyzing distraction experimentally is to utilize capacity-based measures to assess distraction at the level of operational control. Three driving simulation experiments with 61 participants were organized to evaluate which kind of measures could be used to analyze drivers' tactical visual sampling models and the related effects of distraction while searching textual information on in-car display. The effects of two different text types were evaluated. The utilized capacity-based measures seemed to be insufficient for revealing participants' tactical…
Two-phase routing in three-dimensional blocked optical tori
2014
The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…
Enhancing the experience of online users of open education
2014
The limited adoption of Open Educational Resources (OER) has kicked off the launch of several projects to search for possible solutions. One of these projects is “Open Educational Ideas and Innovations” (OEI2). The goal of this project is to find alternatives for increasing the uptake of OER and facilitating the collaborative development of OER. To enhance the experience of the users of open education, we interviewed twelve educators and researchers from different higher education institutions across Europe focusing on gathering insights about idea sharing experiences. In this paper, we present our key findings based on these interviews and outline some recommendations for our next open edu…
Towards a scenario of virtual mental health environments for school-aged children
2017
This study explores student teachers’ future design scenarios focusing on promoting children’s mental health literacy through virtual reality (VR) environments. VR use is on the verge of many breakthroughs in several areas of lived experience. One such area pertains to educational contexts. Student teachers were chosen as the subjects of this study due to the likelihood that they will be the primary users and disseminators of these emerging technologies in educational contexts. The students created five types of future scenarios that contained different environments and activity modes, including those that are still not yet feasible to realize with current technological capabilities. The ai…
Understanding beginners' mistakes with Haskell
2015
AbstractThis article presents an overview of student difficulties in an introductory functional programming (FP) course taught in Haskell. The motivation for this study stems from our belief that many student difficulties can be alleviated by understanding the underlying causes of errors and by modifying the educational approach and, possibly, the teaching language accordingly. We analyze students' exercise submissions and categorize student errors according to compiler error messages and then manually according to the observed underlying cause. Our study complements earlier studies on the topic by applying computer and manual analysis while focusing on providing descriptive statistics of d…
Revisiting rainfall to explore exam questions and performance on CS1
2015
The Rainfall problem comprises small tasks that have been used to investigate student performance in introductory programming. We conducted several kinds of analyses to inform our understandings of student performance in CS1 relating to this problem. We analyzed implementation approaches and program errors, as in related studies, and also explored the role of test writing vis-a-vis the most common student error. Finally, using correlation analyses and manual inspection of the exam answers, we studied how well the Rainfall problem served as an exam question. The students' implementation choices reflected their familiarity with particular loop constructs, while the single most common error co…
Teaching programming by emphasizing self-direction: How did students react to the active role required of them?
2013
Lecturing is known to be a controversial form of teaching. With massed classrooms, in particular, it tends to constrain the active participation of students. One of the remedies applied to programming education is to use technology that can vitalize interaction in the classroom, while another is to base teaching increasingly on programming activities. In this article, we present the first results of an exploratory study, in which we teach programming without lectures, exams, or grades, by heavily emphasizing programming activity, and, in a pedagogical sense, student self-direction. This article investigates how students reacted to the active role required of them and what issues emerged in …
Co-evolution between Trust in Teachers and Higher Education Enabled by ICT Advancement – A Suggestion to ICT Growing Economies
2016
In light of the increasing significance of trust-based higher education towards digitally-rich learning environments, co-evolution dynamism between trust in teachers and higher education enabled by ICT advancement was analyzed. Using the rate of trust in teachers for good education in the Global Teacher Status Index, together with statistics on higher education level and ICT advancement, an empirical numerical analysis of 20 countries was attempted. It was identified that while ICT advanced countries have constructed a co-evolution between ICT, higher education and trust, ICT growing countries have not succeeded due to a vicious cycle between ICT and trust. Finland’s educational success can…
Open Resources as the Educational Basis for a Bachelor-level Project-Based Course
2015
This article presents an innovation-based course concept for project-based learning. In this course, student groups are asked to ideate and implement a software product based on Open Data and Open API releases. By emphasizing studentsâ own product ideation, the course requires and enhances self-directed learning skills and prompts the students to see the unlimited possibilities in becoming and being a practitioner of the computing discipline. Relatedly, the course provides a tool to improve student self-efficacy, as the students, coached through challenges, come to know that they are able to produce software using various open interfaces.