INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION



Similar documents
What You Need to Know About Computer Science, B.S.A.T. Programs

Academic Program Review SUMMARY* Department under review: Computer Science. Date self-study received in Dean s office: November 21, 2013

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Department of Computer Science

Report on Game Design and Development Courses Meeting Knowledge Areas

Department of Computer Science

Computer Science Student Handbook

Computer Science and Informatics. Indiana University South Bend 1700 Mishawaka Ave. South Bend, IN 46615

Incorporation of an online tutoring tool into programming courses. Abstract

Purdue University Department of Computer Science West Lafayette, IN Strategic Plan

The Applied and Computational Mathematics (ACM) Program at The Johns Hopkins University (JHU) is

CURRICULUM VITAE EDUCATION:

to encourage, support, monitor, publicize, raise funds for, and administer current and future initiatives in pre-college education;

Computer Security Courses/Programs

INFORMATION TECHNOLOGY (IT) 515

Computer and Information Sciences

Integration of Mathematical Concepts in the Computer Science, Information Technology and Management Information Science Curriculum

Please consult the Department of Engineering about the Computer Engineering Emphasis.

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Master of Science in Computer Science Information Systems

DIABLO VALLEY COLLEGE CATALOG

Computer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems

Scott McElfresh 209 Belmont Circle, Farmville, VA (434)

How To Get A Computer Science Degree At Appalachian State

CURRICULUM VITAE Herbert L. Dershem

RFI Summary: Executive Summary

Computer Science. Requirements for the Major (updated 11/13/03)

Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.

Master of Science (M.S.), Major in Software Engineering

Computer Science Curriculum Revision

Course Descriptions. preparation.

AC : INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT

How To Get A Computer Science Degree

Master Degree Program in Computer Science (CS)

Computer Science Course Descriptions Page 1

Articulating Instructional Goals

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

Doctor of Philosophy in Systems Engineering

Undergraduate education part of the development plan of KTH CSC June 2008

MEng, BSc Applied Computer Science

CCNA Networking for Home and Small Business (Discovery 1)

Self-Reflection Teaching. Susan M. Blunck, Ph.D. Assistant Clinical Professor Department of Education UMBC

Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis

Programme Specification. BSc (Hons) Computer Games and Animation. Valid from: September 2012 Faculty of Technology, Design and Environment

AC : DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

The following are the measurable objectives for graduated computer science students (ABET Standards):

Cyber Security at NSU

eeye Digital Security Product Training

CSM. Biomedical Physics Program

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

Data Mining and Analytics in Realizeit

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program

Web Media TEC 171. Fall 2014

N/A. Computing, Engineering

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

MEng, BSc Computer Science with Artificial Intelligence

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Curriculum Vitae. John M. Zelle, Ph.D.

Multi-core Curriculum Development at Georgia Tech: Experience and Future Steps

Master of Science in Applied Computer Science

COMPUTER SCIENCE: MISCONCEPTIONS, CAREER PATHS AND RESEARCH CHALLENGES

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department

Academic Program Assessment Plan Certificate: Homeland Security Studies

College of Arts & Sciences. Applied Computer Science (BSACS major)

Study Plan for the Bachelor Degree in Computer Information Systems

The University of North Carolina at Pembroke Academic Catalog

GENERAL EDUCATION REQUIREMENTS

ABET Criterion 3: Outcomes Met By Course Content

LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE

Annual Goals for Math & Computer Science

Department of Psychology

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs:

Identifying the State of Online Instruction in ATE funded Technical Education. Programs at Community Colleges

Course Descriptions. CS 101 Intro to Computer Science

UF EDGE brings the classroom to you with online, worldwide course delivery!

MASTER OF SCIENCE IN COMPUTER AND INFORMATION SYSTEMS

Department of Information Management

Education. Research Experience (Funded Projects)

Transcription:

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION Amruth N. Kumar (Moderator) Ramapo College of New Jersey, Mahwah, NJ amruth@ramapo.edu Jack Beidler University of Scranton, PA beidler@scranton.edu Bhagyavati Columbus State University, GA bhagyavati@colstate.edu Homma Farian SUNY Geneseo, Geneseo, NY farian@geneseo.edu Matthew Haas Corning Community College, Corning, NY haas@corning-cc.edu Yelena Kushleyeva Drexel University, Philadelphia, PA yk45@drexel.edu Frank Lee Drexel University, Philadelphia, PA fjl@cs.drexel.edu Ingrid Russell University of Hartford, CT irussell@hartford.edu INTRODUCTION As computing evolves, so does Computer Science as a discipline. This puts continual pressure on Computer Science educators to review, revise, and rewrite the courses and the curriculum. Educators have been rising up to the challenge, creating new courses, introducing innovative ideas and practices into existing courses, re-organizing the major and carve out minors. This panel will present some of the innovations that have been introduced into the undergraduate Computer Science curriculum.

Innovation is expensive. Change takes time, effort and commitment. This panel is designed to spark discussion among educators about innovation, help interested educators overcome the learning curve associated with curricular innovation and change, and help them adapt from successful practices. The panel will also provide an opportunity for educators in the audience to share their own curricular innovations. HOMMA FARIAN & MATTHEW HAAS - DISTRIBUTED SYSTEMS The Distributed Systems course at SUNY Geneseo is designed to provide a foundation in concurrent and High-Performance Computing environments. It includes exercises in parallel and distributed algorithm design, client/server communications, message passing, and networked operating system communications. Each project in the course focuses on an important aspect of High-Performance Computing. The first project involves a straightforward algorithm, such as a matrix multiplier. Students first implement the solution sequentially, and analyze the limitations. They then split up the algorithm to perform parallel calculations, and analyze the difference in processing capability. The second project focuses on distributed computing methodologies, such as algorithms that can benefit from the scatter/gather method, and may involve more in-depth intercommunication amongst the processing nodes. We have used the classic "Traveling Salesperson" problem in the past. Another project is on client/server communication, and is designed to help students better understand message passing and the importance of communication. Finally, students build and configure their own cluster, which helps them learn about network latencies, disk I/O, memory-based transactions, etc. The students have access to a lab containing an existing cluster of 16 nodes for their projects. FRANK LEE & YELENA KUSHLEYEVA GAME DESIGN: EDUCATIONAL GAMES The goals of this class were to allow students to: 1. Understand and appreciate the critical role of psychology of play and the principles of game design in designing and developing educational games; learn to work with materials from those fields by reading and reflecting on current research findings in game design, psychology of play, education, cognitive science, and human-computer interaction. 2. Recognize the essential role of interdisciplinary teams in designing educational games; learn to effectively function as a part of such teams by working in a group composed of students from Computer Science, Media Art and Design, Mathematics, Education, and Psychology. 3. Recognize the value of feedback received from educators with actual classroom experience for designing successful educational games; learn to solicit such feedback, and efficiently incorporate it into design process. This last aspect of the class actually carries a very deep impact on college students, as it generally teaches them how to work closely and effectively with experts from various domains while designing products for those domains.

To achieve these goals, we divided the course into two parts. In the first half, students learned the fundamentals of game design and the fundamentals of educational practice. This material was learned through lectures, readings, in-class activities, and small-scale design assignments. In the second half, students worked in multi-disciplinary teams to design their own educational math games for grades K-7. During this phase, students cycled through multiple revisions of their game designs. During each cycle of revision, K-7 teachers reviewed and commented on the educational value and classroom-use plausibility of student-proposed designs. This aspect of the course was very successful. The teachers were deeply engaged in the student projects, which in turn became a great source of motivation for our students. Our experience working with students and teachers led us to believe that development and free distribution of fun and engaging educational games has a potential for leading to a strong and beneficial partnership between universities and K-12 schools. INGRID RUSSELL MACHINE LEARNING IN ARTIFICIAL INTELLIGENCE We have been developing an adaptable framework for teaching core AI topics using machine learning as the unifying theme. We have developed a suite of adaptable, handson laboratory projects that can be closely integrated into a one-semester AI course. These projects will enhance the student learning experience in the introductory Artificial Intelligence course by: Introducing machine learning elements into the AI course, Implementing a set of unifying machine learning laboratory projects to tie together the core AI topics, and Developing, applying, and testing an adaptable framework for the presentation of core AI topics which emphasizes the important relationship between AI and computer science in general, and software development in particular. Each project involves the design and implementation of a learning system that enhances a commonly-deployed application. The projects have various emphases and can serve different goals within the general framework of teaching AI. While we envision using each as a semester-long project, the projects are easily adaptable and customizable, allowing faculty to tailor them as they deem necessary for their courses. At one extreme, students may implement an entire machine learning system that illustrates a core AI topic. At the other extreme, students may apply our solution code to understand the computational characteristics of the algorithms. In between is a range of choices, where instructors individually decide how much implementation is best for their students. We will present our model, an overview of the projects, and our experiences using them. JACK BEIDLER WEB PAGES TO WEB SITES TO WEB SERVICES Teaching web development has come a long way. I began with the teaching of HTML and Javascript and the construction of web pages. It soon led to a broader focus on the role of the web server and the view of the web as a multi-tiered client server interactive environment. This in turn led to the delivery of virtual web pages with HTML and

Javascript encapsulated within reusable classes. As a result, more time could be spent in the course discussing the richness of the Web protocol and its potential that goes beyond its original intent. Today the Web protocol is used not just for browser-server communication, more and more it is being used for computer to computer interaction via the Web Protocol. It is a relatively simple step from the use of classes to encapsulate and deliver correctly formed HTML-based communication between a browser and a server to the encapsulation and delivery of XML via classes through secure computer-to-computer communication. My presentation will be directed towards understanding the concepts underlying SOAP and WSDL standards and the development of a simple environment to provide Web protocol-based computer-to-computer experiences. BHAGYAVATI COMPUTER AND NETWORK SECURITY An Information Assurance (IA) track in the graduate program resulted in a sprinkling of IA and security topics in undergraduate courses. From this beginning, a new course designed exclusively for undergraduates was developed. Titled "Introduction to Computer and Network Security," this course has been offered twice in the Computer Science department at Columbus State University. It has been taught as a blended classroom-internet class and as an Internet-only class. Topics covered in this course include traditional security techniques, vulnerabilities of these techniques, fault-tolerant software, email and web security, wireless and IM threats and the security implications of common programming mistakes. Assignment and project questions typically require independent research on the part of the student about network security topologies, security baselines, intrusion detection concepts and cryptography. Assignments include a mix of hands-on exercises and concept-questions as illustrated above. Examples of tools and technologies used for hands-on exercises are nmap, netstat, ping, traceroute, SuperScan, CIS security scanner, open-source Linux tools, hping2 and others. In my presentation, I will discuss how to incorporate sufficient hands-on exercises so that students can grasp the applications of security tools. These exercises are often performed on single machines, therefore the tools need to be simple to use, yet yield reasonably accurate and detailed output to enable the students to understand the vulnerabilities and countermeasures in today's cyber-world. I will provide handouts to the audience containing actual assignment questions that have been effectively used to enhance the learning experience for our students. BIOGRAPHIES Ingrid Russell is Professor of Computer Science at the University of Hartford. Her research interests are artificial neural networks, pattern recognition, and computer science education. Her work has been supported by grants from the National Science Foundation, NASA and the Connecticut Space Grant Consortium. Recently, she chaired the Intelligent Systems focus group of the IEEE-CS ACM Task Force on Computing

Curricula 2001. Frank J Lee is an Assistant Professor of Computer Science at Drexel University. His research interests include Human Computer Interaction, Cognitive Modeling, and Theories of Complex Skill Acquisition. Yelena Kushleyeva is an NSF Graduate Research Fellow pursuing her Ph.D. in Computer Science at Drexel University. Amruth Kumar is Professor of Computer Science at Ramapo College of New Jersey. His research interests include Intelligent Tutoring Systems and Computer Science education research. He is on the eastern and northeastern boards of the Consortium for Computing Sciences in Colleges. Matthew Haas is the Assistant Director of the Distributed Computing Lab at SUNY Geneseo. He is also a Visiting Instructor of Computer Science at Corning Community College, working to establish collaboration between the two schools in the promotion and utilization of High-Performance Computing. Homma Farian is a Lecturer of Computer Science at SUNY Geneseo. Her main areas of interest are CS Curriculum Development, and Distributed Systems. Jack Beidler is Professor of Computer Science at University of Scranton, where he developed a Bachelor s program in Computer Science in 1970. He has more than 45 years of teaching experience and has published three text books. He is the founder of one of the first CCSC conferences. His current research interests are in computational complexity, data structures and algorithms, and applying the Web Protocol. Bhagyavati is Assistant Professor of Computer Science at Columbus State University. Her research interests are in the areas of design, management and applications of wireless and mobile networks. She is involved with wireless grids, mobile databases, network security and wireless information assurance. She is also interested in teaching and learning methodologies, online learning communities and student engagement. ACKNOWLEDGMENTS Machine Learning in AI was partially supported by the National Science Foundation s Course, Curriculum and Laboratory Improvement Program under grant DUE-0409497. The Game Design course is based upon work supported by the National Science Foundation under Grant No. 0205625. Any opinions, findings, and conclusions or recommendations expressed in this work are those of the authors and do not necessarily reflect the views of the National Science Foundation