Results 21 to 30 of about 11,298,820 (376)
Robustness against Read Committed for Transaction Templates with Functional Constraints [PDF]
The popular isolation level Multiversion Read Committed (RC) trades some of the strong guarantees of serializability for increased transaction throughput.
Brecht Vandevoort +3 more
doaj +1 more source
Parity and Streett Games with Costs [PDF]
We consider two-player games played on finite graphs equipped with costs on edges and introduce two winning conditions, cost-parity and cost-Streett, which require bounds on the cost between requests and their responses.
Nathanaël Fijalkow, Martin Zimmermann
doaj +1 more source
Opportunities and challenges in using AI Chatbots in Higher Education [PDF]
Artificial intelligence (AI) conversational chatbots have gained popularity over time, and have been widely used in the fields of e-commerce, online banking, and digital healthcare and well-being, among others. The technology has the potential to provide
Evans, Chris +1 more
core +1 more source
Relative Entailment Among Probabilistic Implications [PDF]
We study a natural variant of the implicational fragment of propositional logic. Its formulas are pairs of conjunctions of positive literals, related together by an implicational-like connective; the semantics of this sort of implication is defined in ...
Albert Atserias +2 more
doaj +1 more source
Smart Choices and the Selection Monad [PDF]
Describing systems in terms of choices and their resulting costs and rewards offers the promise of freeing algorithm designers and programmers from specifying how those choices should be made; in implementations, the choices can be realized by ...
Martin Abadi, Gordon Plotkin
doaj +1 more source
Engaging Equity Pedagogies in Computer Science Learning Environments
In this position paper, we advocate for the use of equity-focused teaching and learning as an essential practice within computer science classrooms. We provide an overview of the theoretical underpinnings of various equity pedagogies (Banks & Banks, 1995)
Tia c. Madkins +2 more
semanticscholar +1 more source
Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime.
Hartel, P.H. (author) +1 more
openaire +6 more sources
Identifying the Prevalence of the Impostor Phenomenon Among Computer Science Students
The Impostor Phenomenon (IP) is often discussed as a problem in the field of computer science, but there has yet to be an empirical study to establish its prevalence among CS students.
Adam Rosenstein, A. Raghu, Leo Porter
semanticscholar +1 more source
Computer science in Dutch secondary education: independent or integrated? [PDF]
Nowadays, in Dutch secondary education, computer science is integrated within school subjects. About ten years ago computer science was considered an independent subject, but in the mid-1980s this idea changed.
Doornekamp, B. Gerard +1 more
core +2 more sources
Parity Games with Weights [PDF]
Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs.
Sven Schewe +2 more
doaj +1 more source

