
- ACM Committee on Curriculum in Computer Science, "Curriculum Recommendations for the Undergraduate Program in Computer Science," SIGSCE Bulletin, 9, 2 (June, 1977), pp. 1--16 Google Scholar
Digital Library
- Brooks, F. P., Jr., The Mythical Man-Month, Addison Wesley, 1975 Google Scholar
Digital Library
- Weinberg, G. M., The Psychology of Computer Programming, Van Nostrand Reinhold, 1971 Google Scholar
Digital Library
- Galler, B. A., "CRISP: An Interactive Student Registration System," Proceedings of the ACM Annual Conference, 1973, pp. 283--289 Google Scholar
Digital Library
- Kramer, D. L. and Mays, D. L., "How to Solve Student Registration Problems," Journal of Systems Management, 22, 5 (May, 1971), pp. 35--8Google Scholar
- Colijn, A., "A Sectioning Algorithm," INFOR, 11, 3 (Oct., 1973), pp. 210--225Google Scholar
Index Terms
(auto-classified)Team projects in the undergraduate curriculum
Recommendations
Team projects throughout the curriculum: course management, teaching initiatives and outreach
With current undergraduate, computer science and information systems curricula, students graduate with technical skills, but lack the understanding of an organizational structure, a team project experience and the impact of information technology on a ...
An Undergraduate Computational Science Curriculum
ICCS '08: Proceedings of the 8th international conference on Computational Science, Part IIWofford College instituted one of the first undergraduate programs in computational science, the Emphasis in Computational Science (ECS). Besides programming, data structures, and calculus, ECS students take two computational science courses (Modeling ...
ACM Undergraduate Curricular Guidance in Computer Science: The First Two Years
ITiCSE '16: Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science EducationUnder the auspices of the ACM Education Board, the Committee for Computing Education in Community Colleges (CCECC) is updating the 2009 ACM associate-degree curricular guidance in computer science with inclusion of contemporary cybersecurity concepts. ...






Comments