首页 > 最新文献

ACM Crossroads最新文献

英文 中文
Security, privacy, and anonymity 安全性、隐私性和匿名性
Pub Date : 2004-12-01 DOI: 10.1145/1144403.1144408
Thomas Wright
A good share of the Internet’s popularity is due to the widespread image of it being totally anonymous. The truth, however, is somewhat different. Anonimity and privacy are no matter of course, but human rights, and their infiltration was never closer than today. The following paper will shed light on the modern means of private and commercial espionage and discuss precautions we can take to protect our privacy in the information age.
互联网受欢迎的很大一部分是由于它是完全匿名的广泛形象。然而,事实却有些不同。匿名和隐私固然是人权,但它们的渗透从未像今天这样紧密。下面的文章将阐明私人和商业间谍的现代手段,并讨论我们可以采取的预防措施,以保护我们的隐私在信息时代。
{"title":"Security, privacy, and anonymity","authors":"Thomas Wright","doi":"10.1145/1144403.1144408","DOIUrl":"https://doi.org/10.1145/1144403.1144408","url":null,"abstract":"A good share of the Internet’s popularity is due to the widespread image of it being totally anonymous. The truth, however, is somewhat different. Anonimity and privacy are no matter of course, but human rights, and their infiltration was never closer than today. The following paper will shed light on the modern means of private and commercial espionage and discuss precautions we can take to protect our privacy in the information age.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Computer security and intrusion detection 计算机安全和入侵检测
Pub Date : 2004-09-01 DOI: 10.1145/1031859.1031861
Khaled Labib
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely.Several major banks have been subject to attacks, in which attackers gained access into customers' accounts and viewed detailed information about the activities on these accounts. In some instances the attackers stole credit card information to blackmail e-commerce companies by threatening to sell this information to unauthorized entities. Several online trading companies and e-commerce sites were shut down temporarily due to major packet flood attacks, also known as Denial-of-Service (DoS) attacks, causing these companies to lose revenue, customer satisfaction, and trust [10]. A major software development company discovered that attackers had broken into its network and stolen the source code for future releases of its popular products. Just recently, the source code of the future flagship product belonging to a major software development company was stolen and made publicly available on the Internet.In order to combat this growing trend of computer attacks, both academic and industry groups have been developing systems to monitor networks and systems and raise alarms of suspicious activities. These systems are called Intrusion Detection Systems (IDS).
电脑攻击现在很常见。通过将您的计算机连接到互联网,您增加了有人闯入的风险,在其上安装恶意程序和工具,并可能通过远程控制使用它来攻击互联网上的其他机器。几家主要银行受到了攻击,攻击者进入了客户的账户,查看了这些账户活动的详细信息。在某些情况下,攻击者窃取信用卡信息,威胁要将这些信息出售给未经授权的实体,以此勒索电子商务公司。几家在线贸易公司和电子商务网站由于大规模的数据包洪水攻击(也称为拒绝服务(DoS)攻击)而暂时关闭,导致这些公司失去了收入、客户满意度和信任[10]。一家大型软件开发公司发现,攻击者侵入了其网络,窃取了其流行产品未来发布的源代码。就在最近,一家大型软件开发公司的未来旗舰产品的源代码被盗,并在互联网上公开发布。为了对抗这种日益增长的计算机攻击趋势,学术界和工业界团体一直在开发监控网络和系统的系统,并对可疑活动发出警报。这些系统被称为入侵检测系统(IDS)。
{"title":"Computer security and intrusion detection","authors":"Khaled Labib","doi":"10.1145/1031859.1031861","DOIUrl":"https://doi.org/10.1145/1031859.1031861","url":null,"abstract":"Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely.Several major banks have been subject to attacks, in which attackers gained access into customers' accounts and viewed detailed information about the activities on these accounts. In some instances the attackers stole credit card information to blackmail e-commerce companies by threatening to sell this information to unauthorized entities. Several online trading companies and e-commerce sites were shut down temporarily due to major packet flood attacks, also known as Denial-of-Service (DoS) attacks, causing these companies to lose revenue, customer satisfaction, and trust [10]. A major software development company discovered that attackers had broken into its network and stolen the source code for future releases of its popular products. Just recently, the source code of the future flagship product belonging to a major software development company was stolen and made publicly available on the Internet.In order to combat this growing trend of computer attacks, both academic and industry groups have been developing systems to monitor networks and systems and raise alarms of suspicious activities. These systems are called Intrusion Detection Systems (IDS).","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130400188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
DNA smart card for financial transactions 金融交易的DNA智能卡
Pub Date : 2004-09-01 DOI: 10.1145/1031859.1031863
Sofia Gleni, P. Petratos
In this paper, a secure environment for electronic commerce is introduced. The environment is formed via a synthesis of biometrics consumer authentication with a security token. Such a token is a smart card containing cryptographic keys and a cryptographic microprocessor for data encryption. The keys are used to further authenticate the possessor of the card as the actual owner and also to facilitate secure electronic financial transactions. New technologies like these bring benefits to society by enhancing the standard of living, however, numerous challenges are introduced [1].Biometrics is a Greek composite word stemming from the synthesis of bio and metric, meaning life measurement. In this context, the science of biometrics is concerned with the accurate measurement of unique biological characteristics of an individual in order to securely identify them to a computer or other electronic system. Biological characteristics measured usually include fingerprints, voice patterns, retinal and iris scans, face patterns, and even the chemical composition of an individual's DNA [9].
本文介绍了一个安全的电子商务环境。环境是通过使用安全令牌的生物识别消费者身份验证的合成而形成的。这种令牌是包含加密密钥和用于数据加密的加密微处理器的智能卡。这些密码匙可进一步证明持卡人是持卡人,并促进安全的电子金融交易。像这样的新技术通过提高生活水平给社会带来了好处,然而,也带来了许多挑战[1]。Biometrics是由“bio”和“metric”合成而来的希腊语合成词,意思是“生命测量”。在这种情况下,生物识别学关注的是准确测量个体独特的生物特征,以便在计算机或其他电子系统中安全地识别他们。测量的生物特征通常包括指纹、声音模式、视网膜和虹膜扫描、面部模式,甚至个人DNA的化学成分[9]。
{"title":"DNA smart card for financial transactions","authors":"Sofia Gleni, P. Petratos","doi":"10.1145/1031859.1031863","DOIUrl":"https://doi.org/10.1145/1031859.1031863","url":null,"abstract":"In this paper, a secure environment for electronic commerce is introduced. The environment is formed via a synthesis of biometrics consumer authentication with a security token. Such a token is a smart card containing cryptographic keys and a cryptographic microprocessor for data encryption. The keys are used to further authenticate the possessor of the card as the actual owner and also to facilitate secure electronic financial transactions. New technologies like these bring benefits to society by enhancing the standard of living, however, numerous challenges are introduced [1].Biometrics is a Greek composite word stemming from the synthesis of bio and metric, meaning life measurement. In this context, the science of biometrics is concerned with the accurate measurement of unique biological characteristics of an individual in order to securely identify them to a computer or other electronic system. Biological characteristics measured usually include fingerprints, voice patterns, retinal and iris scans, face patterns, and even the chemical composition of an individual's DNA [9].","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116691100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A distributed security scheme for ad hoc networks 一种用于自组织网络的分布式安全方案
Pub Date : 2004-09-01 DOI: 10.1145/1031859.1031864
Dhaval Gada, Rajat Gogri, P. Rathod, Zalak Dedhia, Nirali Mody, S. Sanyal, A. Abraham
In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results.
在有线基础设施不可行的自组织无线网络中,能量和带宽节约是向研究人员提出挑战的两个关键因素。有限的带宽使得网络容易被路由协议的控制信号阻塞。为有线网络开发的路由方案很少考虑这类限制。相反,他们假设网络基本稳定,路由消息的开销可以忽略不计。考虑到有线和无线网络之间的这些差异,有必要开发一种限制网络拥塞的无线路由协议[1,5,8,9,10,11]。本文建议对现有的Ad hoc按需向量(AODV)路由协议(RFC 3561)进行微小修改,以便在特定类型的拒绝服务(DoS)攻击期间限制网络中的拥塞。除此之外,它绝对不会产生额外的开销[4]。我们描述了由于路由请求(RREQ)泛滥引起的DoS攻击及其对现有aodv驱动的移动自组织网络(MANET)的影响[2,14]。为了对抗这种DoS攻击,提出了一种主动方案[12]。我们提出了一个例子来描述RREQ泛洪对纯AODV和修改后的AODV协议的影响。为了量化所提出方案的有效性,我们在移动环境中模拟了DoS[6]攻击并研究了性能结果。
{"title":"A distributed security scheme for ad hoc networks","authors":"Dhaval Gada, Rajat Gogri, P. Rathod, Zalak Dedhia, Nirali Mody, S. Sanyal, A. Abraham","doi":"10.1145/1031859.1031864","DOIUrl":"https://doi.org/10.1145/1031859.1031864","url":null,"abstract":"In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
WiFi exposed WiFi暴露
Pub Date : 2004-09-01 DOI: 10.1145/1031859.1031862
Andrea Bittau
Over the past few years, IEEE 802.11 wireless networks have become increasingly widely deployed. Wireless LANs can be found in coffee shops, airports, hospitals, and all major institutes. However, as for conventional wired networks, the spread of such networks may have been faster than the diffusion of security knowledge about them. As a consequence, 802.11 is the new playground for many hackers, who are attracted to the environment by virtue of its anonymity. Attacks may be traced back to the wireless network, but the intruder could have been anyone driving by within the radius of the network, making it hard, if not impossible, for him/her to be traced. Securing wireless networks is a hard task, because the standard solutions do not work effectively in guaranteeing privacy and authentication, as this article shows; as a consequence, many wireless networks are left open.This article is structured as follows: initially, an overview of the 802.11 protocol is presented. This is followed by an analysis of the steps involved in connection to and use of such a network, first in the absence of encryption and then taking into account WEP. Attacks for these different scenarios are presented and analyzed, leading to the conclusion that WEP is unsuitable as the sole security measure for such links. Finally, attacks on wired networks that are connected to a wireless LAN are analyzed.The article concludes that existing standards for wireless security as applied to the most widely used wireless standard, 802.11, are inadequate in several ways, can be attacked using publicly available tools, and lead to a false sense of security. Some advice about mitigation of threats is offered throughout the article, but the most effective solution is awareness of potential attacks and the maximization of the amount of time and effort needed to break into the network by using defence in depth.
在过去的几年中,IEEE 802.11无线网络得到了越来越广泛的部署。无线局域网可以在咖啡店、机场、医院和所有主要机构中找到。然而,对于传统的有线网络来说,这种网络的传播速度可能比安全知识的传播速度要快。因此,802.11成为许多黑客的新游乐场,他们被其匿名性所吸引。攻击可以追溯到无线网络,但入侵者可能是在网络半径内开车经过的任何人,这使得他/她很难被追踪,如果不是不可能的话。保护无线网络是一项艰巨的任务,因为标准解决方案不能有效地保证隐私和身份验证,正如本文所示;因此,许多无线网络处于开放状态。本文的结构如下:首先介绍802.11协议的概述。接下来是对连接和使用这种网络所涉及的步骤的分析,首先在没有加密的情况下,然后考虑到WEP。本文介绍并分析了针对这些不同场景的攻击,得出WEP不适合作为此类链接的唯一安全措施的结论。最后,分析了对连接到无线局域网的有线网络的攻击。本文的结论是,应用于最广泛使用的无线标准802.11的现有无线安全标准在几个方面是不充分的,可以使用公开可用的工具进行攻击,并导致错误的安全感。本文提供了一些关于减轻威胁的建议,但最有效的解决方案是意识到潜在的攻击,并通过使用深度防御来最大化侵入网络所需的时间和精力。
{"title":"WiFi exposed","authors":"Andrea Bittau","doi":"10.1145/1031859.1031862","DOIUrl":"https://doi.org/10.1145/1031859.1031862","url":null,"abstract":"Over the past few years, IEEE 802.11 wireless networks have become increasingly widely deployed. Wireless LANs can be found in coffee shops, airports, hospitals, and all major institutes. However, as for conventional wired networks, the spread of such networks may have been faster than the diffusion of security knowledge about them. As a consequence, 802.11 is the new playground for many hackers, who are attracted to the environment by virtue of its anonymity. Attacks may be traced back to the wireless network, but the intruder could have been anyone driving by within the radius of the network, making it hard, if not impossible, for him/her to be traced. Securing wireless networks is a hard task, because the standard solutions do not work effectively in guaranteeing privacy and authentication, as this article shows; as a consequence, many wireless networks are left open.This article is structured as follows: initially, an overview of the 802.11 protocol is presented. This is followed by an analysis of the steps involved in connection to and use of such a network, first in the absence of encryption and then taking into account WEP. Attacks for these different scenarios are presented and analyzed, leading to the conclusion that WEP is unsuitable as the sole security measure for such links. Finally, attacks on wired networks that are connected to a wireless LAN are analyzed.The article concludes that existing standards for wireless security as applied to the most widely used wireless standard, 802.11, are inadequate in several ways, can be attacked using publicly available tools, and lead to a false sense of security. Some advice about mitigation of threats is offered throughout the article, but the most effective solution is awareness of potential attacks and the maximization of the amount of time and effort needed to break into the network by using defence in depth.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124716120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using practical toys, modified for technical learning 使用实用的玩具,修改为技术学习
Pub Date : 2004-08-31 DOI: 10.1145/1027313.1027319
T. Weisheit
Educators have used toys in the classroom for as long as toys have been in existence, especially in the field of elementary education. Toys can provide motivation as well as keep the students focused on a particular area of study for longer periods of time something students at the elementary level often struggle with. These students need to obtain fundamental skills for creating, disseminating, retrieving, and evaluating information from electronic media [10]. Using robots as toys and teaching tools is a concept that has also been around for quite a while, and a great way to introduce these fundamental skills [4].
自从玩具出现以来,教育工作者就一直在课堂上使用玩具,尤其是在基础教育领域。玩具可以提供动力,也可以让学生长时间专注于特定的学习领域,这是小学阶段的学生经常难以做到的。这些学生需要获得创造、传播、检索和评估电子媒体信息的基本技能[10]。使用机器人作为玩具和教学工具是一个已经存在了很长时间的概念,也是介绍这些基本技能的好方法[4]。
{"title":"Using practical toys, modified for technical learning","authors":"T. Weisheit","doi":"10.1145/1027313.1027319","DOIUrl":"https://doi.org/10.1145/1027313.1027319","url":null,"abstract":"Educators have used toys in the classroom for as long as toys have been in existence, especially in the field of elementary education. Toys can provide motivation as well as keep the students focused on a particular area of study for longer periods of time something students at the elementary level often struggle with. These students need to obtain fundamental skills for creating, disseminating, retrieving, and evaluating information from electronic media [10]. Using robots as toys and teaching tools is a concept that has also been around for quite a while, and a great way to introduce these fundamental skills [4].","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The development of a game playing framework using interface-based programming 使用基于接口的编程开发了一个游戏框架
Pub Date : 2004-08-31 DOI: 10.1145/1027313.1027318
M. Cohen
An interface can be defined as a contract that outlines the terms of usefor a class of objects. When a class implements an interface, the classis agreeing to the contract outlined by the interface. In other words,the class is agreeing to provide the logic for all the methods listed inthe interface. The single most important attribute of an interface isits implementation independence. The contract enforced by an interfacedoes not make any assumptions about how the methods are implemented; theimplementation strategy is left to the implementing class. By enforcingwhat a class of objects must do, without placing restrictions onhow it is done, interfaces play a key role in making thebehavior of objects more flexible.
接口可以被定义为一个契约,它概述了一类对象的使用条款。当一个类实现一个接口时,这个类就同意了接口所概述的契约。换句话说,类同意为接口中列出的所有方法提供逻辑。接口最重要的一个属性是实现独立性。由接口强制执行的契约不会对方法如何实现做出任何假设;实现策略留给实现类。通过强制对象类必须做什么,而不限制如何做,接口在使对象的行为更灵活方面发挥了关键作用。
{"title":"The development of a game playing framework using interface-based programming","authors":"M. Cohen","doi":"10.1145/1027313.1027318","DOIUrl":"https://doi.org/10.1145/1027313.1027318","url":null,"abstract":"An interface can be defined as a contract that outlines the terms of usefor a class of objects. When a class implements an interface, the classis agreeing to the contract outlined by the interface. In other words,the class is agreeing to provide the logic for all the methods listed inthe interface. The single most important attribute of an interface isits implementation independence. The contract enforced by an interfacedoes not make any assumptions about how the methods are implemented; theimplementation strategy is left to the implementing class. By enforcingwhat a class of objects must do, without placing restrictions onhow it is done, interfaces play a key role in making thebehavior of objects more flexible.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What is a good first programming language? 什么是好的初级编程语言?
Pub Date : 2004-08-31 DOI: 10.1145/1027313.1027320
Diwaker Gupta
Programming is an art. As with any other art, it is important to use the right medium. In programming, this translates to the choice of programming language. But why should one pay so much attention to one's first programming language? When there exists a plethora of programming languages and visual editors to make programming so easy, why does it matter which programming language you start with? There are so many books, on-line tutorials, and code samples out there that you could practically learn any language in one day.
编程是一门艺术。与其他艺术一样,重要的是要使用正确的媒介。在编程中,这转化为编程语言的选择。但是为什么一个人要如此关注自己的第一门编程语言呢?当存在大量的编程语言和可视化编辑器使编程变得如此简单时,为什么从哪种编程语言开始还那么重要呢?有那么多的书、在线教程和代码示例,你几乎可以在一天内学会任何语言。
{"title":"What is a good first programming language?","authors":"Diwaker Gupta","doi":"10.1145/1027313.1027320","DOIUrl":"https://doi.org/10.1145/1027313.1027320","url":null,"abstract":"Programming is an art. As with any other art, it is important to use the right medium. In programming, this translates to the choice of programming language. But why should one pay so much attention to one's first programming language? When there exists a plethora of programming languages and visual editors to make programming so easy, why does it matter which programming language you start with? There are so many books, on-line tutorials, and code samples out there that you could practically learn any language in one day.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Requirements engineering: closing the gap between academic supply and industry demand 需求工程:缩小学术供给与行业需求之间的差距
Pub Date : 2004-08-31 DOI: 10.1145/1027313.1027317
K. Winbladh
Recent trends in the information technology industry call for substantial changes in computer science education. As an effect of the recession, the increase in the number of computer science graduates, and the outsourcing of information technology (IT) work to other countries, the unemployment rate among engineers and especially among computer science professionals is increasing [11]. In this economic situation, it is imperative that computer science students are well prepared before entering the work force; new graduates must understand what skills the IT industry is seeking.
信息技术行业的最新趋势要求计算机科学教育发生重大变化。由于经济衰退的影响,计算机科学毕业生数量的增加,以及信息技术(IT)工作外包到其他国家,工程师,特别是计算机科学专业人员的失业率正在上升[11]。在这种经济形势下,计算机科学专业的学生在进入劳动力市场之前做好充分的准备是非常必要的;应届毕业生必须了解IT行业所需要的技能。
{"title":"Requirements engineering: closing the gap between academic supply and industry demand","authors":"K. Winbladh","doi":"10.1145/1027313.1027317","DOIUrl":"https://doi.org/10.1145/1027313.1027317","url":null,"abstract":"Recent trends in the information technology industry call for substantial changes in computer science education. As an effect of the recession, the increase in the number of computer science graduates, and the outsourcing of information technology (IT) work to other countries, the unemployment rate among engineers and especially among computer science professionals is increasing [11]. In this economic situation, it is imperative that computer science students are well prepared before entering the work force; new graduates must understand what skills the IT industry is seeking.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"18 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mixed nuts: atypical classroom techniques for computer science courses 混合坚果:计算机科学课程的非典型课堂技巧
Pub Date : 2004-08-31 DOI: 10.1145/1027313.1027316
Sid Stamm
22 Summer 2008/ Vol. 14, No. 4 www.acm.org/crossroads Crossroads Introduction AAAAAAAAAAHHHHHHHHHHHHHHHHH! Didn’t expect that, did you? Neither did Steve Wolfman’s class when he let loose a bloodcurdling scream on the first day. His goal was to demonstrate the strength of community and pooled resources. This point was clearly illustrated when he asked the entire lecture hall of two hundred students to scream at the top of their lungs. Why? He was using an atypical teaching technique to get the attention of the students and keep them interested. Students do not always learn all that the instructor is trying to get across a lecture. In fact, it is likely that even students who can get the most out of a lecture grow restless and might be more involved in class if it were taught with a twist. In order to capture the interest of students more effectively, instructors could use atypical classroom techniques. Moreover, unlike lecturing and giving homework, these unorthodox techniques can also keep students attentive and target preferred learning styles. This article presents some experimental and anecdotal evidence to support the theory that the use of these techniques improves students’ learning in an introductory Computer Science (CS) class.
22 Summer 2008/ Vol. 14 No. 4 www.acm.org/crossroads Crossroads Introduction AAAAAAAAAAHHHHHHHHHHHHHHHHH!没想到会这样,对吧?史蒂夫·沃尔夫曼(Steve Wolfman)的班级在第一天发出令人毛骨悚然的尖叫时也没有。他的目标是展示社区和资源集合的力量。当他要求整个演讲厅的200名学生扯着嗓子尖叫时,这一点得到了清楚的说明。为什么?他在用一种非典型的教学方法来吸引学生的注意力,使他们保持兴趣。学生们并不总是能学到讲师想要讲的所有内容。事实上,即使是那些能从讲课中得到最多收获的学生,也可能会变得焦躁不安,如果以一种扭曲的方式授课,他们可能会更投入课堂。为了更有效地抓住学生的兴趣,教师可以使用非典型的课堂技巧。此外,与讲课和布置家庭作业不同,这些非常规的方法也可以让学生保持专注,并针对他们喜欢的学习方式。本文提供了一些实验和轶事证据来支持这样一个理论,即在计算机科学(CS)入门课程中使用这些技术可以提高学生的学习水平。
{"title":"Mixed nuts: atypical classroom techniques for computer science courses","authors":"Sid Stamm","doi":"10.1145/1027313.1027316","DOIUrl":"https://doi.org/10.1145/1027313.1027316","url":null,"abstract":"22 Summer 2008/ Vol. 14, No. 4 www.acm.org/crossroads Crossroads Introduction AAAAAAAAAAHHHHHHHHHHHHHHHHH! Didn’t expect that, did you? Neither did Steve Wolfman’s class when he let loose a bloodcurdling scream on the first day. His goal was to demonstrate the strength of community and pooled resources. This point was clearly illustrated when he asked the entire lecture hall of two hundred students to scream at the top of their lungs. Why? He was using an atypical teaching technique to get the attention of the students and keep them interested. Students do not always learn all that the instructor is trying to get across a lecture. In fact, it is likely that even students who can get the most out of a lecture grow restless and might be more involved in class if it were taught with a twist. In order to capture the interest of students more effectively, instructors could use atypical classroom techniques. Moreover, unlike lecturing and giving homework, these unorthodox techniques can also keep students attentive and target preferred learning styles. This article presents some experimental and anecdotal evidence to support the theory that the use of these techniques improves students’ learning in an introductory Computer Science (CS) class.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124425950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
ACM Crossroads
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1