Number int64 1 7.61k | Text stringlengths 2 3.11k |
|---|---|
6,601 | The batch size refers to the number of work units to be processed within one batch operation. Some examples are: |
6,602 | The IBM mainframe z/OS operating system or platform has arguably the most highly refined and evolved set of batch processing facilities owing to its origins, long history, and continuing evolution. Today such systems commonly support hundreds or even thousands of concurrent online and batch tasks within a single operat... |
6,603 | The Unix programs cron, at, and batch allow for complex scheduling of jobs. Windows has a job scheduler. Most high-performance computing clusters use batch processing to maximize cluster usage. |
6,604 | Computer science education is essential to preparing students for the 21st century workforce. As technology becomes increasingly integrated into all aspects of society, the demand for skilled computer scientists is growing. According to the Bureau of Labor Statistics, employment of computer and information technology o... |
6,605 | In addition to preparing students for careers in the technology industry, computer science education also promotes computational thinking skills, which are valuable in many fields, including business, healthcare, and education. By learning to think algorithmically and solve problems systematically, students can become ... |
6,606 | The history of computer science education can be traced back to the early days of computing, when programming was primarily done by scientists and mathematicians. As computers became more widely used in industry and government, the need for skilled programmers grew, and universities began to offer courses in computer s... |
6,607 | In comparison to science education and mathematics education, computer science education is a much younger field. In the history of computing, digital computers were only built from around the 1940s – although computation has been around for centuries since the invention of analog computers. |
6,608 | Another differentiator of computer science education is that it has primarily only been taught at university level until recently, with some notable exceptions in Israel, Poland and the United Kingdom with the BBC Micro in the 1980s as part of Computer science education in the United Kingdom. Computer science has been ... |
6,609 | Primary and secondary computer science education is relatively new in the United States with many K-12 CS teachers facing obstacles to integrating CS instruction such as professional isolation, limited CS professional development resources, and low levels of CS teaching self-efficacy. According to a 2021 report, only 5... |
6,610 | The curriculum for computer science education varies depending on the level of education and country. At the elementary and middle school level, computer science education usually focuses on block or visual programming languages such as Scratch or python using basic programming concepts, such as loops, conditionals, an... |
6,611 | In college and graduate school, computer science education may include courses in topics such as artificial intelligence, machine learning, data science, and computer graphics. Many computer science programs also offer courses in computer architecture, operating systems, and computer networks. |
6,612 | Teaching methods in computer science education vary depending on the level of education and the goals of the program. At the elementary and middle school level, computer science education may focus on interactive games and puzzles to teach programming concepts. In high school and college, computer science education may... |
6,613 | Online learning platforms and coding bootcamps have also become popular methods of teaching computer science skills. These programs offer self-paced learning and can be accessed from anywhere with an internet connection, as computer science is more about practicality and real-world application. |
6,614 | Computing education research or Computer science education research is an interdisciplinary field that focuses on studying the teaching and learning of computer science. It is a subfield of both computer science and education research, and is concerned with understanding how computer science is taught, learned, and as... |
6,615 | Computer science education research emerged as a field of study in the 1970s, when researchers began to explore the effectiveness of different approaches to teaching computer programming. Since then, the field has grown to encompass a wide range of topics related to computer science education, including curriculum desi... |
6,616 | One of the primary goals of computer science education research is to improve the teaching and learning of computer science. To this end, researchers study a variety of topics, including: |
6,617 | Researchers in computer science education seek to design curricula that are effective and engaging for students. This may involve studying the effectiveness of different programming languages, or developing new pedagogical approaches that promote active learning. |
6,618 | Computer science education researchers are interested in developing effective ways to assess student learning outcomes. This may involve developing new measures of student knowledge or skills, or evaluating the effectiveness of different assessment methods. |
6,619 | Researchers in computer science education are interested in exploring different teaching methods and instructional strategies. This may involve studying the effectiveness of lectures, online tutorials, or peer-to-peer learning. |
6,620 | Computer science education researchers are interested in promoting diversity and inclusion in computer science education. This may involve studying the factors that contribute to under representation of certain groups in computer science, and developing interventions to promote inclusivity and equity. |
6,621 | The Association for Computing Machinery runs a Special Interest Group on Computer science education known as SIGCSE which celebrated its 50th anniversary in 2018, making it one of the oldest and longest running ACM Special Interest Groups. An outcome of computing education research are Parsons problems. |
6,622 | In many countries, there is a significant gender gap in computer science education. In 2015, 15.3% of computer science students graduating from non-doctoral granting institutions in the US were women while at doctoral granting institutions, the figure was 16.6%. The number of female PhD recipients in the US was 19.3% i... |
6,623 | This problem mainly arises due to the lack of interests of girls in computing starting from the primary level. Despite numerous efforts by programs specifically designed to increase the ratio of women in this field, no significant improvement has been observed. Furthermore, a declining trend has been noticed in the inv... |
6,624 | The main reason for the failure of these programs is because almost all of them focused on girls in high school or higher levels of education. Researchers argue that by then women have already made up their mind and stereotypes start to form about computer scientists. Computer Science is perceived as a male dominated f... |
6,625 | Evidently, there are a few countries in Asia and Africa where these stereotypes do not exist and women are encouraged for a career in science starting at the primary level, thus resulting in a gender gap that is virtually nonexistent. In 2011, women earned half of the computer science degrees in Malaysia. In 2001, 55 p... |
6,626 | A less common, broader meaning of proceedings are the acts and happenings of an academic field, a learned society. For example, the title of the Acta Crystallographica journals is Neo-Latin for "Proceedings in Crystallography"; the Proceedings of the National Academy of Sciences of the United States of America is the m... |
6,627 | Selecting and collecting papers for conferences is organized by one or more persons, who form the editorial team. The quality of the papers is typically ensured by having external people read the papers before they are accepted in the proceedings. The level of quality control varies considerably from conference to conf... |
6,628 | Since the collection of papers comes from individual researchers, the character of proceedings is distinctly different from an educational textbook. Each paper typically is quite isolated from the other papers in the proceedings. Mostly there is no general argument leading from one contribution to the next. |
6,629 | In some cases, the editors of the proceedings may decide to further develop the proceedings into a textbook. This may even be a goal at the outset of the conference. |
6,630 | Conference proceedings are published in-house by the organizing institution of the conference or via an academic publisher. For example, the Lecture Notes in Computer Science by Springer take much of their input from proceedings. Conference proceedings also get published through dedicated proceedings series as an edite... |
6,631 | In the sciences, the quality of publications in conference proceedings is usually not as high as that of international scientific journals. However, in computer science, papers published in conference proceedings are accorded a higher status than in other fields, due to the fast-moving nature of the field. |
6,632 | A number of full-fledged academic journals unconnected to particular conferences also use the word "proceedings" as part of their name, for example, Proceedings of the National Academy of Sciences of the United States of America. |
6,633 | Conference proceedings may be published as a book or book series, in a journal, or otherwise as a serial publication . In many cases, impact factors are not available, although other journal metrics might exist. Bibliographic indexing often is done in separate bibliographic databases and citation indexes, e.g., Confer... |
6,634 | Conferences accepting a broad range of topics from theoretical computer science, including algorithms, data structures, computability, computational complexity, automata theory and formal languages: |
6,635 | Conferences whose topic is algorithms and data structures considered broadly, but that do not include other areas of theoretical computer science such as computational complexity theory: |
6,636 | Conferences on computational geometry, graph drawing, and other application areas of geometric computing: |
6,637 | GD – International Symposium on Graph Drawing |
6,638 | SoCG – Symposium on Computational Geometry |
6,639 | Conferences on programming languages, programming language theory and compilers: |
6,640 | Conferences on software engineering: |
6,641 | Conferences on formal methods in software engineering, including formal specification, formal verification, and static code analysis: |
6,642 | Conferences on concurrent, distributed, and parallel computing, fault-tolerant systems, and dependable systems: |
6,643 | Conferences on high-performance computing, cluster computing, and grid computing: |
6,644 | Conferences on operating systems, storage systems and middleware: |
6,645 | Conferences on computer architecture: |
6,646 | Conferences on computer-aided design and electronic design automation: |
6,647 | Conferences on computer networking: |
6,648 | Wireless networks and mobile computing, including ubiquitous and pervasive computing, wireless ad hoc networks and wireless sensor networks: |
6,649 | Conferences on computer security and privacy: |
6,650 | Cryptography conferences: |
6,651 | Conferences on databases, information systems, information retrieval, data mining and the World Wide Web: |
6,652 | Conferences on artificial intelligence and machine learning: |
6,653 | Conferences on Evolutionary computation. |
6,654 | Conferences on automated reasoning: |
6,655 | Conferences on computer vision and pattern recognition: |
6,656 | Conferences on computational linguistics and natural language processing: |
6,657 | Conferences on computer graphics, geometry processing, image processing, and multimedia: |
6,658 | Conferences on human–computer interaction and user interfaces: |
6,659 | Conferences on bioinformatics and computational biology: |
6,660 | An in-memory service in SOP can be transparently externalized as a web service operation. Due to language and platform independent Web Service standards, SOP embraces all existing programming paradigms, languages and platforms. In SOP, the design of the programs pivot around the semantics of service calls, logical rou... |
6,661 | While SOP supports the basic programming constructs for sequencing, selection and iteration, it is differentiated with a slew of new programming constructs that provide built-in native ability geared towards data list manipulation, data integration, automated multithreading of service modules, declarative context manag... |
6,662 | Semantic design tools and runtime automation platforms can be built to support the fundamental concepts of SOP. For example, a service virtual machine that automatically creates service objects as units of work and manages their context can be designed to run based on the SOP program metadata stored in XML and create... |
6,663 | SOP concepts provide a robust base for a semantic approach to programming integration and application logic. There are three significant benefits to this approach: |
6,664 | The following are some of the key concepts of SOP: |
6,665 | In SOP, in-memory software modules are strictly encapsulated through well-defined service interfaces that can be externalized on-demand as web service operations. This minimal unit of encapsulation maximizes the opportunities for reusability within other in-memory service modules as well as across existing and legacy s... |
6,666 | A service interface in SOP is an in-memory object that describes a well-defined software task with well-defined input and output data structures. Service interfaces can be grouped into packages. An SOP service interface can be externalized as a WSDL operation and a single service or a package of services can be describ... |
6,667 | In SOP, runtime properties stored on the service interface metadata serve as a contract with the service virtual machine . One example for the use of runtime properties is that in declarative service synchronization. A service interface can be declared as a fully synchronized interface, meaning that only a single inst... |
6,668 | A service invoker makes service requests. It is a pluggable in-memory interface that abstracts the location of a service producer as well as the communication protocol, used between the consumer and producer when going across computer memory, from the SOP runtime environment such as an SVM. The producer can be in-proc... |
6,669 | A service listener receives service requests. It is a pluggable in-memory interface that abstracts the communication protocol for incoming service requests made to the SOP runtime environment such as the SVM. Through this abstract layer, the SOP runtime environment can be virtually embedded within the memory address of... |
6,670 | In SOP, a service module can be either implemented as a Composite or Atomic service. It is important to note that Service modules built through the SOP paradigm have an extroverted nature and can be transparently externalized through standards such as SOAP or any proprietary protocol. |
6,671 | One of the most important characteristic of SOP is that it can support a fully semantic-based approach to programming. Furthermore, this semantic-based approach can be layered into a visual environment built on top of a fully metadata-driven layer for storing the service interface and service module definitions. Furthe... |
6,672 | A composite service implementation is the semantic definition of a service module based on SOP techniques and concepts. If you look inside of a black-boxed interface definition of a composite service, you may see other service interfaces connected to each other and connected to SOP programming constructs. A Composite ... |
6,673 | SOP supports the basic programming constructs for sequencing, selection and iteration as well as built-in, advance behavior. Furthermore, SOP supports semantic constructs for automatic data mapping, translation, manipulation and flow across inner services of a composite service. |
6,674 | A service inside of the definition of a composite service is implicitly sequenced through the semantic connectivity of built-in success or failure ports of other inner services with its built-in activation port. When an inner service runs successfully, all the inner services connected to its success port will run nex... |
6,675 | Logical selection is accomplished through data-driven branching constructs and other configurable constructs. In general, configurable constructs are services built into the SOP platform with inputs and outputs that can assume the input/output shape of other connected services. For example, a configurable construct u... |
6,676 | A composite service can be declared to loop. The loop can be bound by a fixed number of iterations with an optional built-in delay between iterations and it can dynamically terminate using a "service exit with success" or "service exit with failure" construct inside of the looping composite service. Furthermore, any ... |
6,677 | Data mapping, translation, and transformation constructs enable automatic transfer of data across inner services. An inner-service is prepared to run, when it is activated and all of its input dependencies are resolved. All the prepared inner-services within a composite service run in a parallel burst called a "hypercy... |
6,678 | Exception handling is a run-time error in Java. Exception handling in SOP is simply accomplished by connecting the failure port of inner services to another inner service, or to a programming construct. "Exit with failure" and "exit with success" constructs are examples of constructs used for exception handling. If no... |
6,679 | A composite service can be declared as a transaction boundary. The runtime environment for SOP automatically creates and manages a hierarchical context for composite service objects which are used as a transaction boundary. This context automatically commits or rollbacks upon the successful execution of the composite s... |
6,680 | Special composite services, called compensation services, can be associated with any service within SOP. When a composite service that is declared as a transaction boundary fails without an exception handling routing, the SOP runtime environment automatically dispatches the compensation services associated with all th... |
6,681 | An atomic service is an in-memory extension of the SOP runtime environment through a service native interface it is essentially a plug-in mechanism. For example, if SOP is automated through an SVM, a service plug-in is dynamically loaded into the SVM when any associated service is consumed. An example of a service plu... |
6,682 | SOP presents significant opportunities to support cross-cutting concerns for all applications built using the SOP technique. The following sections define some of these opportunities: |
6,683 | The SOP runtime environment can systematically provide built-in and optimized profiling, logging and metering for all services in real-time. |
6,684 | Based on declared key input values of a service instance, the outputs of a non time-sensitive inner service can be cached by the SOP runtime environment when running in the context of a particular composite service. When a service is cached for particular key input values, the SOP runtime environment fetches the cache... |
6,685 | SOP provides a mechanism for associating a special kind of composite service, trigger service, to any other service. When that service is consumed, the SOP platform automatically creates and consumes an instance of the associated trigger service with an in-memory copy of the inputs of the triggering service. This con... |
6,686 | In addition to the ability to call any service, Service Request Events and Shared Memory are two of the SOP built-in mechanisms provided for inter-service communication. The consumption of a service is treated as an Event in SOP. SOP provides a correlation-based event mechanism that results in the pre-emption of a runn... |
6,687 | In SOP, customizations are managed through an inventive feature called Service Overrides. Through this feature, a service implementation can be statically or dynamically overridden by one of many possible implementations at runtime. This feature is analogous to polymorphism in object-oriented programming. Each possibl... |
6,688 | Select services can be deployed securely for external programmatic consumption by a presentation layer, or other applications. Once service accounts are defined, the SOP runtime environment automatically manages access through consumer account provisioning mechanisms. |
6,689 | The SOP runtime environment can systematically provide built-in authentication and service authorization. For the purpose of authorization, SOP development projects, consumer accounts, packages and services are treated as resources with access control. In this way, the SOP runtime environment can provide built-in auth... |
6,690 | Since all artifacts of SOP are well-encapsulated services and all SOP mechanisms, such as shared memory, can be provided as distributable services, large-scale virtualization can be automated by the SOP runtime environment. Also, the hierarchical service stack of a composite service with the multiple execution graphs ... |
6,691 | The term service-oriented programming was first published in 2002 by Alberto Sillitti, Tullio Vernazza and Giancarlo Succi in a book called "Software Reuse: Methods, Techniques, and Tools." SOP, as described above, reflects some aspects of the use of the term proposed by Sillitti, Vernazza and Succi. |
6,692 | Today, the SOP paradigm is in the early stages of mainstream adoption. There are four market drivers fueling this adoption: |
6,693 | Service-Oriented Programming: A New Paradigm of Software Reuse |
6,694 | Grid Virtualization and Itanium®-based Solutions |
6,695 | Object-oriented programming is a programming paradigm based on the concept of objects, which can contain data and code: data in the form of fields , and code in the form of procedures . In OOP, computer programs are designed by making them out of objects that interact with one another. |
6,696 | Many of the most widely used programming languages are multi-paradigm and they support object-oriented programming to a greater or lesser degree, typically in combination with imperative programming, procedural programming and functional programming. |
6,697 | Significant object-oriented languages include Ada, ActionScript, C++, Common Lisp, C#, Dart, Eiffel, Fortran 2003, Haxe, Java, JavaScript, Kotlin, Logo, MATLAB, Objective-C, Object Pascal, Perl, PHP, Python, R, Raku, Ruby, Scala, SIMSCRIPT, Simula, Smalltalk, Swift, Vala and Visual Basic.NET. |
6,698 | Terminology invoking "objects" in the modern sense of object-oriented programming made its first appearance at the artificial intelligence group at MIT in the late 1950s and early 1960s. "Object" referred to LISP atoms with identified properties . Another early MIT example was Sketchpad created by Ivan Sutherland in 19... |
6,699 | Independently of later MIT work such as AED, Simula was developed during the years 1961–1967. Simula introduced important concepts that are today an essential part of object-oriented programming, such as class and object, inheritance, and dynamic binding. The object-oriented Simula programming language was used mainly ... |
6,700 | Influenced by the work at MIT and the Simula language, in November 1966 Alan Kay began working on ideas that would eventually be incorporated into the Smalltalk programming language. Kay used the term "object-oriented programming" in conversation as early as 1967. Although sometimes called "the father of object-oriente... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.