A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Training Computing Educators to Become Computing Education Researchers
[article]
2021
arXiv
pre-print
The computing education community endeavors to consistently move forward, improving the educational experience of our students. As new innovations in computing education practice are learned and shared, however, these papers may not exhibit the desired qualities that move simple experience reports to true Scholarship of Teaching and Learning (SoTL). We report on our six years of experience in running professional development for computing educators in empirical research methods for social and
arXiv:2110.05560v1
fatcat:znycnhemt5djdasp27o7vt35qe
more »
... havioral studies in the classroom. Our goal is to have a direct impact on instructors who are in the beginning stages of transitioning their educational innovations from anecdotal to empirical results that can be replicated by instructors at other institutions. To achieve this, we created a year-long mentoring experience, beginning with a multi-day workshop on empirical research methods during the summer, followed by regular mentoring sessions with participants, and culminating in a follow-up session at the following year's SIGCSE Technical Symposium. From survey results and as evidenced by eventual research results and publications from participants, we believe that our method of structuring empirical research professional development was successful and could be a model for similar programs in other areas.
Utilizing verification and validation certificates to estimate software defect density
2005
Software engineering notes
http://www.sf.net/
For more information, go to http://www.eclipse.org/. 3 The plug-in is available at http://arches.csc.ncsu.edu/sherriff/devcop/. ...
For example, if two programmers were about to start pair programming on a piece of code, it would be beneficial if they could press a single button and the Eclipse plug-in would then mark all code until ...
doi:10.1145/1095430.1081768
fatcat:2cv4mqhmizfg3a7sxfsmu7ypdq
Teaching web services and service-oriented architecture using mobile platforms
2010
2010 IEEE Frontiers in Education Conference (FIE)
Even as everyday software increasingly transitions to online software services, many educational projects in software development courses still remain on single-user PC systems. To better prepare our students for this emerging trend in software development, material on web services and service-oriented architecture should become more of a focus in computer science courses. This paper describes our experiences in teaching a senior-level course at the University of Virginia in the fall of 2009
doi:10.1109/fie.2010.5673561
fatcat:awii6xqa4zfmbhjnzlf2atzo3i
more »
... red around the concepts of web services and service-oriented architecture using the Windows Mobile platform. In this course, students worked in teams to produce web services that could be utilized by other teams to eventually build a campus tour application for the Windows Mobile device. We believe that using mobile devices is an optimal vehicle for teaching service-oriented architecture due to their relatively limited processing power, portability, pervasiveness in society, and interest among students.
Automated Fix Generator for SQL Injection Attacks
2008
2008 19th International Symposium on Software Reliability Engineering (ISSRE)
If these variables are used as part of the SQL structure without having been previously validated, then the query is marked as vulnerable. ...
doi:10.1109/issre.2008.44
dblp:conf/issre/DysartS08
fatcat:2jui2prjlzcjrgvusnqbvqqooy
DevCOP: A Software Certificate Management System for Eclipse
2006
Proceedings - International Symposium on Software Reliability Engineering
Mark Jones at Portland State University and rest of the Programatica team for their input on the various parts of this work. This work was funded by the National Science Foundation.
References ...
The Certificate Browser also allows developers to revalidate certificates that may still be valid, but are marked invalid due to a change in the code, as described in the previous section. ...
doi:10.1109/issre.2006.22
dblp:conf/issre/SherriffW06
fatcat:cm5mk6bhwreablwrt2ugwlftca
A service learning practicum capstone
2014
Proceedings of the 45th ACM technical symposium on Computer science education - SIGCSE '14
We present the design and execution of a Service Learning Practicum (SLP) course sequence intended to be year-long capstone for computer science seniors. Students are teamed into groups of six, and develop software for local nonprofit organizations. In addition to the structure of the course, we describe the challenges faced (legal, organizational, etc.), student perceptions via survey results, and provide a number of suggestions for other institutions who are looking to create a similar course
doi:10.1145/2538862.2538974
dblp:conf/sigcse/BloomfieldSW14
fatcat:cj2i7sbq3vbnbgkebhyzrky27i
more »
... sequence. At the end of the capstone experience, the customers are provided with working software that meet their current needs.
"Inform, Experience, Implement" — Teaching an intensive high school summer course
2012
2012 Frontiers in Education Conference Proceedings
During the summer of 2011, twenty-four high school students participated in an intense, three-week computer science course at the University of Virginia. The course met for twentyone three-hour sessions, thus encompassing more contact time than a standard college-level course. The course was structured in an "Inform, Experience, Implement" active-learning format: students were exposed to the history of a particular problem in context and participated in an active learning lesson regarding the
doi:10.1109/fie.2012.6462268
dblp:conf/fie/LayerST12
fatcat:kksh2uzinjhrjnp66pbrvi3uwy
more »
... pic before learning how to address the examined problem through programming. This structure helped integrate into the course best practices from experiential learning, kinesthetic outreach activities, and active learning pedagogy. Utilizing this three-part rotation curriculum achieved some important goals, including holding the interest of students during the summer for six hours a day and successfully motivating students who had no programming background.
Compatibility of partnered students in computer science education
2010
Proceedings of the 41st ACM technical symposium on Computer science education - SIGCSE '10
This paper details the results of an investigation into the compatibility of partnered computer science students. The study involved approximately 290 students at the University of Virginia (UVA). This study builds on the work of researchers at North Carolina State University (NCSU). NCSU researchers have conducted a number of studies on the compatibility of pair programmers. We examined many of the factors that the NCSU researchers explored in their studies (including personality type,
doi:10.1145/1734263.1734347
dblp:conf/sigcse/SennettS10
fatcat:pcjitzpwhncungqvsdsupi7alq
more »
... style, skill level, programming self esteem, work ethic, and time management choices) in order to determine whether the conclusions of the research at NCSU also hold true at UVA. Consistent with the NCSU studies, we found that skill level continues to be the most important factor in student compatibility.
Empirical Software Change Impact Analysis using Singular Value Decomposition
2008
2008 International Conference on Software Testing, Verification, and Validation
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how files in the system tend to change together in response to fixes for identified faults and failures. We propose a methodology for determining the impact of a new system modification by analyzing software change records through singular value decomposition. This methodology generates clusters of files that historically
doi:10.1109/icst.2008.25
dblp:conf/icst/SherriffW08
fatcat:qcs4gm3l65eblnan6dqhjoqzcm
more »
... to change together to address faults and failures found in the code base. We performed a post hoc case study using this technique on five open source software systems. We determined that our technique was effective in identifying impacted files in a system from an introduced change when the developers tended to make small, targeted updates to the source system regularly. We further compared our technique against two other impact analysis techniques (PathImpact and CoverageImpact) and found that our technique provided comparable results, while also identifying non-source files that could be impacted by the change.
Early estimation of defect density using an in-process Haskell metrics model
2005
Software engineering notes
Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software development process. This paper presents a suite of in-process metrics that leverages the software testing effort to create a defect density prediction model for use throughout the software development process. A case study conducted with Galois Connections, Inc. in a Haskell programming environment indicates that the
doi:10.1145/1082983.1083285
fatcat:dzaegwfrlfdb7kywtk377hf7em
more »
... sulting defect density prediction is indicative of the actual system defect density.
Role of larger software artifacts in introductory computer science courses
2010
2010 IEEE Frontiers in Education Conference (FIE)
This paper compares the effectiveness of two approaches that can be used to teach concepts in introductory courses such as CS1 and CS2 -a conventional lecture-based approach and one using larger software programs (artifacts) with accompanying guided exercises. Our assessment includes measures of students' self-confidence as well as a measurement of their knowledge of the topics used in this study: inheritance and iterators. Finally, we consider some generalizations that can be made about these treatments and how well they perform.
doi:10.1109/fie.2010.5673385
fatcat:sdtctjqcz5g5fc2xujzycw5gmq
A Systematic Literature Review of Empiricism and Norms of Reporting in Computing Education Research Literature
[article]
2021
arXiv
pre-print
Heckman, Carver, Sherriff, and Al-Zubidy
See SIGCSE Board Program Chair Responsibilities policy at https://sigcse.org/policies/pcr.html. ...
arXiv:2107.01984v1
fatcat:42s5wtijszetxoes3qwzgwiwqy
Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records
2007
The 18th IEEE International Symposium on Software Reliability (ISSRE '07)
During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same files that were just changed, since the effects of a change in the code base can have ramifications in other parts of the system. We propose a methodology for determining the effect of a change and then prioritizing regression test cases by gathering software change records and analyzing them through singular value
doi:10.1109/issre.2007.25
dblp:conf/issre/SherriffLW07
fatcat:zucqp2mkuzgzvox5mro4aw4nue
more »
... position. This methodology generates clusters of files that historically tend to change together. Combining these clusters with test case information yields a matrix that can be multiplied by a vector representing a new system modification to create a prioritized list of test cases. We performed a post hoc case study using this technique with three minor releases of a software product at IBM. We found that our methodology suggested additional regression tests in 50% of test runs and that the highest-priority suggested test found an additional fault 60% of the time.
Assessment of adult body composition using bioelectrical impedance: comparison of researcher calculated to machine outputted values
2016
BMJ Open
Objectives: To explore the usefulness of Bioelectrical Impedance Analysis (BIA) for general use by identifying best-evidenced formulae to calculate lean and fat mass, comparing these to historical gold standard data and comparing these results with machine-generated output. In addition, we explored how to best to adjust lean and fat estimates for height and how these overlapped with body mass index (BMI). Design: Cross-sectional observational study within population representative cohort study.
doi:10.1136/bmjopen-2015-008922
pmid:26743700
pmcid:PMC4716172
fatcat:7ttwhri44be2xdeekm2qvfnsua
more »
... Setting: Urban community, North East England Participants: Sample of 506 mothers of children aged 7-8 years, mean age 36.3 years. Methods: Participants were measured at a home visit using a portable height measure and leg-to-leg BIA machine (Tanita TBF-300MA). Measures: Height, weight, bioelectrical impedance (BIA). Outcome measures: Lean and fat mass calculated using best-evidenced published formulae as well as machine-calculated lean and fat mass data. Results: Estimates of lean mass were similar to historical results using gold standard methods. When compared with the machine-generated values, there were wide limits of agreement for fat mass and a large relative bias for lean that varied with size. Lean and fat residuals adjusted for height differed little from indices of lean (or fat)/height 2 . Of 112 women with BMI >30 kg/m 2 , 100 (91%) also had high fat, but of the 16 with low BMI (<19 kg/m 2 ) only 5 (31%) also had low fat. Conclusions: Lean and fat mass calculated from BIA using published formulae produces plausible values and demonstrate good concordance between high BMI and high fat, but these differ substantially from the machine-generated values. Bioelectrical impedance can supply a robust and useful field measure of body composition, so long as the machine-generated output is not used. Franco-Villoria M, et al. BMJ Open 2016;6:e008922.
A (Updated) Review of Empiricism at the SIGCSE Technical Symposium
2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education - SIGCSE '16
The computer science education (CSEd) research community consists of a large group of passionate CS educators who often contribute to other disciplines of CS research. There has been a trend in other disciplines toward more rigorous and empirical evaluation of various hypotheses. Prior investigations of the thencurrent state of CSEd research showed a distinct lack of rigor in the top research publication venues, with most papers falling in the general category of experience reports. In this
doi:10.1145/2839509.2844601
dblp:conf/sigcse/Al-ZubidyCHS16
fatcat:7uhigiaf2fbhlpzuhkg5jqdt6y
more »
... r, we present our examination of the two most recent proceedings of the SIGCSE Technical Symposium, providing a snapshot of the current state of empiricism at the largest CSEd venue. Our goal to categorize the current state of empiricism in the SIGCSE Technical Symposium and identify where the community might benefit from increased empiricism when conducting CSEd research. We found an increase in empirical validation of CSEd research to over 70%; however, our findings suggest that current CSEd research minimizes replication precluding meta-analysis and theory building. Keywords Systematic literature review, empirical computer science education, scholarship of teaching and learning.
« Previous
Showing results 1 — 15 out of 1,361 results