Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available May 1, 2026
-
The Computer Science Teachers Association (CSTA) K-12 Computer Science Standards identify ‘Algorithms and Programming’ as a key CS concept across all grade bands that encompasses sub-concepts such as algorithms, decomposition, variables, and control structures. Previous studies have shown that algorithms and programming concepts often pose challenges for novice programmers, and that instruction in these areas is often superficial. We developed formative assessment tasks to investigate middle school students’ understanding of four CS standards related to algorithms and programming and collected responses from over 100 students associated with five different teachers. We found that students demonstrated a limited understanding of the standards. These findings contribute to the growing literature on middle school students’ understanding of algorithms and programming, and provide insights that can inform CS teacher development, instruction, and curriculum design.more » « lessFree, publicly-accessible full text available March 17, 2026
-
The "Computer Science for All" initiative advocates for universal access to computer science (CS) instruction. A key strategy toward this end has been to establish CS content standards outlining what all students should have the opportunity to learn. Standards can support curriculum quality and access to quality CS instruction, but only if they are used to inform curriculum design and instructional practice. Professional learning offered to teachers of CS has typically focused on learning to implement a specific curriculum, rather than deepening understanding of CS concepts. We set out to develop a set of educative resources, formative assessment tools and teacher professional development (PD) sessions to support middle school CS teachers' knowledge of CS standards and standards-aligned formative assessment literacy. Our PD and associated resources focus on five CS standards in the Algorithm and Programming strand and are meant to support teachers using any CS curriculum or programming language. In this experience report, we share what we learned from implementing our standards-based PD with four middle school CS teachers. Teachers initially perceived standards as irrelevant to their teaching but they came to appreciate how a deeper understanding of CS concepts could enhance their instructional practice. Analysis of PD observations and exit surveys, teacher interviews, and teacher responses to a survey assessing CS pedagogical content knowledge demonstrated the complexity of using content standards as a driver of high-quality CS instruction at the middle school level, and reinforced our position that more standards-focused PD is needed.more » « lessFree, publicly-accessible full text available February 12, 2026
-
Advanced sensing and cloud systems propel the rapid advancements of service-oriented smart manufacturing. As a result, there is widespread generation and proliferation of data in the interest of manufacturing analytics. The sheer amount and velocity of data have also attracted a myriad of malicious parties, unfortunately resulting in an elevated prevalence of cyber-attacks whose impacts are only gaining in severity. Therefore, this article presents a new distributed cryptosystem for analytical computing on encrypted data in the manufacturing environment, with a case study on manufacturing resource planning. This framework harmonizes Paillier cryptography with the Alternating Direction Method of Multipliers (ADMM) for decentralized computation on encrypted data. Security analysis shows that the proposed Paillier-ADMM system is resistant to attacks from external threats, as well as privacy breaches from trusted-but-curious third parties. Experimental results show that smart allocation is more cost-effective than the benchmarked deterministic and stochastic policies. The proposed distributed cryptosystem shows strong potential to leverage the distributed data for manufacturing intelligence, while reducing the risk of data breaches.more » « lessFree, publicly-accessible full text available December 1, 2025
-
Public emergencies pose catastrophic casualties and financial losses in densely populated areas, rendering communities such as cities, towns, and universities particularly susceptible due to their intricate environments and high pedestrian traffic. While simulation analysis offers a flexible and cost-effective approach to evaluating evacuation procedures, conventional evacuation models are often limited to specific scenarios and communities, overlooking the diverse range of emergencies and evacuee behaviors. Thus, there is an urgent need for an evacuation model capable of capturing complex structures of communities and modeling evacuee responses to various emergencies. This paper presents a novel approach to simulating responsive evacuation behaviors for multiple emergency situations in public communities through spatial network modeling and multi-agent modeling. Leveraging a community network framework adaptable to different community layouts based on map data, the proposed model employs a multi-agent approach to characterize responsive and decentralized evacuation decision-making. Experimental results show the model’s efficacy in representing pedestrian flow and pedestrians’ reactive behavior across various campuses based on real-world map data. Additionally, the case study highlights the potential of the proposed model to simulate pedestrian dynamics for a variety of heterogeneous emergencies. The proposed community evacuation model holds strong promise for evaluating evacuation policies and providing insights into resilient plans during public emergencies, thereby enhancing community safety.more » « lessFree, publicly-accessible full text available August 28, 2025
-
Abstract Industry 4.0 drives exponential growth in the amount of operational data collected in factories. These data are commonly distributed and stored in different business units or cooperative companies. Such data-rich environments increase the likelihood of cyber attacks, privacy breaches, and security violations. Also, this poses significant challenges on analytical computing on sensitive data that are distributed among different business units. To fill this gap, this article presents a novel privacy-preserving framework to enable federated learning on siloed and encrypted data for smart manufacturing. Specifically, we leverage fully homomorphic encryption (FHE) to allow for computation on ciphertexts and generate encrypted results that, when decrypted, match the results of mathematical operations performed on the plaintexts. Multilayer encryption and privacy protection reduce the likelihood of data breaches while maintaining the prediction performance of analytical models. Experimental results in real-world case studies show that the proposed framework yields superior performance to reduce the risk of cyber attacks and harness siloed data for smart manufacturing.more » « lessFree, publicly-accessible full text available July 1, 2025