Mark E. Hoffman

Learn More
Do new college students already know much of what has previously been taught in our computer literacy courses (assuming a functional definition of knowledge according to which students are proficient with personal computer and Internet applications)? We conducted a survey of incoming first-year students at Quinnipiac University to learn not only their skill(More)
In many applications, the use of Bayesian probability theory is problematical. Information needed to feasibility calculate is unavailable. There are different method-ologies for dealing with this problem, e.g., maximal entropy and Dempster-Shafer Theory. If one can make independence assumptions, many of the problems disappear, and in fact, this is often the(More)
  • Glen A Reece, Austin Tate, David I Brown, Mark Hoffman, Rebecca E Burnard
  • 1993
1 Introduction Military crisis management is a complex problem which requires the active participation of countless planners at a myriad of locations around the world. From the Joint Chiefs of Staff (JCS) and the Unified Commander's headquarters comes guidance and direction about what needs to be done. Geographically separated Supported Commander's(More)
Writing in Computer Science education is typically writing to communicate to a professional audience--also known as "writing in the discipline." (WID) A few Computer Science educators have promoted "writing to learn" (WTL) for active learning. A gap exists between these two forms of writing that inhibits the general adoption of writing in Computer Science.(More)
While researchers are increasingly interested in understanding the boundaries surrounding the work and personal life domains, few have tested the propositions set forth by theory. Boundary theory proposes that individuals manage the boundaries between work and personal life through processes of segmenting and/or integrating the domains. The authors(More)