Ferramentas do usuário

Ferramentas do site


v05n01:40

EDIÇÃO Abril 2012

ACM Inroads - Volume 3 Issue 1, March 2012

The first characteristic of a CS graduate. Martin
http://dl.acm.org/citation.cfm?id=2077810

Mid-course corrections. Walker
http://dl.acm.org/citation.cfm?id=2077813

Teaching-oriented faculty and computing education research. Lister
http://dl.acm.org/citation.cfm?id=2077814

Beauty and computer programming. Norman
http://dl.acm.org/citation.cfm?id=2077824

ACM XRDS Spring 2012 | Volume 18, No. 3

Public Relations for Computer Science Students. Giannikas
http://dl.acm.org/citation.cfm?id=2090276.2090281

What is Computation? Horswill
http://dl.acm.org/citation.cfm?id=2090276.2090283

Future of Computing: Inspiration from Nature Shasha
http://dl.acm.org/citation.cfm?id=2090276.2090289

IEEE Potentials – Vol 31, Issue 3

Engineering Outside the Box. Floyd
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6193298

An Engineering Career Begins with Childhood Inspiration. Kuhn
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6193301

What Professors Do. Sadiku, Olasupo, Nelatury
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6193305

IEEE Potentials – Vol 31, Issue 2

Ethics for Engineers? Floyd
http://dx.doi.org/10.1109/MPOT.2011.2177759

My First Job: Engineering Evolution. Walsh
http://dx.doi.org/10.1109/MPOT.2011.2178280

IEEE Potentials – Vol 31, Issue 1

Finding the Fun and Games in Science Learning. Ambrosio
http://dx.doi.org/10.1109/MPOT.2011.941130

Communications of the ACM - Vol. 55 No. 4 - April 2012

Improving Gender Composition in Computing: Combining academic and industry representation, the NCWIT Pacesetters program works to increase the participation of girls and women in computing: Ross, Litzler, Cohoon, Sanders
http://dl.acm.org/citation.cfm?id=2133806.2133817

Reading CS Classics: Revisiting required reading: Tekir
http://dl.acm.org/citation.cfm?id=2133806.2133818

Communications of the ACM - Vol. 55 No. 3 - March 2012

What is an Algorithm? Vardi
http://dl.acm.org/citation.cfm?id=2093548.2093549

Policing the Future: Computer programs and new mathematical algorithms are helping law enforcement agencies better predict when and where crimes will occur: Greengard
http://dl.acm.org/citation.cfm?id=2093548.2093555

Stanford Schooling – Gratis! Stanford University's experiment with online classes could help transform computer science education: Hyman
http://dl.acm.org/citation.cfm?id=2093548.2093556

War 2.0: Cyberweapons and Ethics: Considering the basic ethical questions that must be resolved in the new realm of cyberwarfare: Lin, Allhoff, Rowe
http://dl.acm.org/citation.cfm?id=2093548.2093558

Do Software Copyrights Protect What Programs Do? A case before the European Court of Justice has significant implications for innovation and competition in the software industry: Samuelson
http://dl.acm.org/citation.cfm?id=2093548.2093559

The Idea Idea: What if practices rather than ideas are the main source of innovation? Denning
http://dl.acm.org/citation.cfm?id=2093548.2093560

Training Users vs. Training Soldiers: Experiences from the Battlefield: Kostakos
http://dl.acm.org/citation.cfm?id=2093548.2093562

Communications of the ACM - Vol. 55 No. 2 - February 2012

Peer Instruction: A Teaching Method to Foster Deep Understanding: How the computing education community can learn from physics education. Simon, Cutts
http://dl.acm.org/citation.cfm?id=2076450.2076459

Communications of the ACM - Vol. 55 No. 1 - January 2012

The Yin and Yang of Copyright and Technology: Examining the recurring conflicts between copyright and technology from piano rolls to domain-name filtering. Picker
http://dl.acm.org/citation.cfm?id=2063176.2063190

The Difference Engine: Observations on cognitive diversity and team performance. Armour
http://dl.acm.org/citation.cfm?id=2063176.2063191

IEEE Computer – Vol. 45. Issue 4. April 2012

Software Crisis 2.0. Fitzgerald
http://dx.doi.org/10.1109/MC.2012.147

Learning from the Best. Grier, Dumbacher
http://dx.doi.org/10.1109/MC.2012.140

IEEE Computer – Vol. 45. Issue 3. March 2012

WikiLeaks and the Matter of Private Manning. Berghel
http://dx.doi.org/10.1109/MC.2012.105

Bots and Cyborgs: Wikipedia's Immune System. Halfaker
http://dx.doi.org/10.1109/MC.2012.82

IEEE Computer – Vol. 45. Issue 2. February 2012

The Next Step for Ethics Education Is Enforcing the Code. Brinkman
http://dx.doi.org/10.1109/MC.2012.67

IEEE Computer – Vol. 45. Issue 1. January 2012

The Second-Order Effects of Steve Jobs. Severance
http://dx.doi.org/10.1109/MC.2012.31

Imagining the Future: Thoughts on Computing. Reed, Gannon, Larus
http://dx.doi.org/10.1109/MC.2011.327

Society's Nervous System: Building Effective Government, Energy, and Public Health Systems. Pentland
http://dx.doi.org/10.1109/MC.2011.299

Are Our Online “Friends” Really Friends? Lam, Riedl
http://dx.doi.org/10.1109/MC.2012.5



Esta é uma publicação eletrônica da Sociedade Brasileira de Computação – SBC. Qualquer opinião pessoal não pode ser atribuída como da SBC. A responsabilidade sobre o seu conteúdo e a sua autoria é inteiramente dos autores de cada artigo.
v05n01/40.txt · Última modificação: 2020/09/22 02:27 (edição externa)

Ferramentas da página