A novel approach to teaching Computer Science has been developed for the academic year 2013/14 at... more A novel approach to teaching Computer Science has been developed for the academic year 2013/14 at Middlesex University, UK. The whole first year is taught in an holistic fashion, with programming at the core, using a number of practical projects to support learning and inspire the students. The Lisp derivative, Racket, has been chosen as the main programming language for the year. An important feature of the approach is the use of physical computing so that the students are not always working “through the screen”, but can experience physical manifestations of behaviours resulting from programs. In this paper we describe the MIddlesex Robotic plaTfOrm (MIRTO), an open-source platform built using Raspberry Pi, Arduino, and with Racket as the core coordination mechanism. We describe the architecture of the platform and how it can be used to support teaching of core Computer Science topics, we describe our teaching and assessment strategies, we present students’ projects and we provide ...
We conducted a field study at the British Transport Police (BTP) Control Room in London to evalua... more We conducted a field study at the British Transport Police (BTP) Control Room in London to evaluate three hypotheses: that operators in a command and control environment miss changes; that missing changing information affects Situation Awareness (SA); and that interruptions affect ...
Page 1. Engineering Optimization Vol. 40, No. 12, December 2008, 11151135 A local search heurist... more Page 1. Engineering Optimization Vol. 40, No. 12, December 2008, 11151135 A local search heuristic for bounded-degree minimum spanning trees MS Zahrania, MJ Loomesb, JA Malcolma and AA Albrechtc* aSchool of Computer ...
Abstract. Authentication is traditionally required to be strong enough to distinguish legitimate ... more Abstract. Authentication is traditionally required to be strong enough to distinguish legitimate entities from unauthorised entities, and always involves some form of proof of identity, directly or indirectly. Conven-tional storable or delegable authentication scenarios in the ...
Research and Development in Intelligent Systems XXIII, 2007
Page 1. LSA-based Landscape Analysis for Multicast Routing Mohammed S. Zahrani University of Hert... more Page 1. LSA-based Landscape Analysis for Multicast Routing Mohammed S. Zahrani University of Hertfordshire School of Computer Science Hatfield, ALIO gAB, UK James A. Malcolm University of Hertfordshire School of Computer Science Hatfield, ALI0 gAB, UK ...
Specifications written in the formal specification language Z often make use of a form of decompo... more Specifications written in the formal specification language Z often make use of a form of decomposition that is novel to programmers. A published Z specification is rewritten using the form of decomposition familiar to programmers. Whenever decomposition is used, there must be some strategy ...
A novel approach to teaching Computer Science has been developed for the academic year 2013/14 at... more A novel approach to teaching Computer Science has been developed for the academic year 2013/14 at Middlesex University, UK. The whole first year is taught in an holistic fashion, with programming at the core, using a number of practical projects to support learning and inspire the students. The Lisp derivative, Racket, has been chosen as the main programming language for the year. An important feature of the approach is the use of physical computing so that the students are not always working “through the screen”, but can experience physical manifestations of behaviours resulting from programs. In this paper we describe the MIddlesex Robotic plaTfOrm (MIRTO), an open-source platform built using Raspberry Pi, Arduino, and with Racket as the core coordination mechanism. We describe the architecture of the platform and how it can be used to support teaching of core Computer Science topics, we describe our teaching and assessment strategies, we present students’ projects and we provide ...
We conducted a field study at the British Transport Police (BTP) Control Room in London to evalua... more We conducted a field study at the British Transport Police (BTP) Control Room in London to evaluate three hypotheses: that operators in a command and control environment miss changes; that missing changing information affects Situation Awareness (SA); and that interruptions affect ...
Page 1. Engineering Optimization Vol. 40, No. 12, December 2008, 11151135 A local search heurist... more Page 1. Engineering Optimization Vol. 40, No. 12, December 2008, 11151135 A local search heuristic for bounded-degree minimum spanning trees MS Zahrania, MJ Loomesb, JA Malcolma and AA Albrechtc* aSchool of Computer ...
Abstract. Authentication is traditionally required to be strong enough to distinguish legitimate ... more Abstract. Authentication is traditionally required to be strong enough to distinguish legitimate entities from unauthorised entities, and always involves some form of proof of identity, directly or indirectly. Conven-tional storable or delegable authentication scenarios in the ...
Research and Development in Intelligent Systems XXIII, 2007
Page 1. LSA-based Landscape Analysis for Multicast Routing Mohammed S. Zahrani University of Hert... more Page 1. LSA-based Landscape Analysis for Multicast Routing Mohammed S. Zahrani University of Hertfordshire School of Computer Science Hatfield, ALIO gAB, UK James A. Malcolm University of Hertfordshire School of Computer Science Hatfield, ALI0 gAB, UK ...
Specifications written in the formal specification language Z often make use of a form of decompo... more Specifications written in the formal specification language Z often make use of a form of decomposition that is novel to programmers. A published Z specification is rewritten using the form of decomposition familiar to programmers. Whenever decomposition is used, there must be some strategy ...
Uploads
Papers by Martin Loomes