1,361 Hits in 1.3 sec

Training Computing Educators to Become Computing Education Researchers [article]

Jeffrey C. Carver, Sarah Heckman, Mark Sherriff
2021 arXiv   pre-print
The computing education community endeavors to consistently move forward, improving the educational experience of our students. As new innovations in computing education practice are learned and shared, however, these papers may not exhibit the desired qualities that move simple experience reports to true Scholarship of Teaching and Learning (SoTL). We report on our six years of experience in running professional development for computing educators in empirical research methods for social and
more » ... havioral studies in the classroom. Our goal is to have a direct impact on instructors who are in the beginning stages of transitioning their educational innovations from anecdotal to empirical results that can be replicated by instructors at other institutions. To achieve this, we created a year-long mentoring experience, beginning with a multi-day workshop on empirical research methods during the summer, followed by regular mentoring sessions with participants, and culminating in a follow-up session at the following year's SIGCSE Technical Symposium. From survey results and as evidenced by eventual research results and publications from participants, we believe that our method of structuring empirical research professional development was successful and could be a model for similar programs in other areas.
arXiv:2110.05560v1 fatcat:znycnhemt5djdasp27o7vt35qe

Utilizing verification and validation certificates to estimate software defect density

Mark Sherriff
2005 Software engineering notes For more information, go to 3 The plug-in is available at  ...  For example, if two programmers were about to start pair programming on a piece of code, it would be beneficial if they could press a single button and the Eclipse plug-in would then mark all code until  ... 
doi:10.1145/1095430.1081768 fatcat:2cv4mqhmizfg3a7sxfsmu7ypdq

Teaching web services and service-oriented architecture using mobile platforms

Mark Sherriff
2010 2010 IEEE Frontiers in Education Conference (FIE)  
Even as everyday software increasingly transitions to online software services, many educational projects in software development courses still remain on single-user PC systems. To better prepare our students for this emerging trend in software development, material on web services and service-oriented architecture should become more of a focus in computer science courses. This paper describes our experiences in teaching a senior-level course at the University of Virginia in the fall of 2009
more » ... red around the concepts of web services and service-oriented architecture using the Windows Mobile platform. In this course, students worked in teams to produce web services that could be utilized by other teams to eventually build a campus tour application for the Windows Mobile device. We believe that using mobile devices is an optimal vehicle for teaching service-oriented architecture due to their relatively limited processing power, portability, pervasiveness in society, and interest among students.
doi:10.1109/fie.2010.5673561 fatcat:awii6xqa4zfmbhjnzlf2atzo3i

Automated Fix Generator for SQL Injection Attacks

Fred Dysart, Mark Sherriff
2008 2008 19th International Symposium on Software Reliability Engineering (ISSRE)  
If these variables are used as part of the SQL structure without having been previously validated, then the query is marked as vulnerable.  ... 
doi:10.1109/issre.2008.44 dblp:conf/issre/DysartS08 fatcat:2jui2prjlzcjrgvusnqbvqqooy

DevCOP: A Software Certificate Management System for Eclipse

Mark Sherriff, Laurie Williams
2006 Proceedings - International Symposium on Software Reliability Engineering  
Mark Jones at Portland State University and rest of the Programatica team for their input on the various parts of this work. This work was funded by the National Science Foundation. References  ...  The Certificate Browser also allows developers to revalidate certificates that may still be valid, but are marked invalid due to a change in the code, as described in the previous section.  ... 
doi:10.1109/issre.2006.22 dblp:conf/issre/SherriffW06 fatcat:cm5mk6bhwreablwrt2ugwlftca

A service learning practicum capstone

Aaron Bloomfield, Mark Sherriff, Kara Williams
2014 Proceedings of the 45th ACM technical symposium on Computer science education - SIGCSE '14  
We present the design and execution of a Service Learning Practicum (SLP) course sequence intended to be year-long capstone for computer science seniors. Students are teamed into groups of six, and develop software for local nonprofit organizations. In addition to the structure of the course, we describe the challenges faced (legal, organizational, etc.), student perceptions via survey results, and provide a number of suggestions for other institutions who are looking to create a similar course
more » ... sequence. At the end of the capstone experience, the customers are provided with working software that meet their current needs.
doi:10.1145/2538862.2538974 dblp:conf/sigcse/BloomfieldSW14 fatcat:cj2i7sbq3vbnbgkebhyzrky27i

"Inform, Experience, Implement" — Teaching an intensive high school summer course

Ryan Layer, Mark Sherriff, Luther Tychonievich
2012 2012 Frontiers in Education Conference Proceedings  
During the summer of 2011, twenty-four high school students participated in an intense, three-week computer science course at the University of Virginia. The course met for twentyone three-hour sessions, thus encompassing more contact time than a standard college-level course. The course was structured in an "Inform, Experience, Implement" active-learning format: students were exposed to the history of a particular problem in context and participated in an active learning lesson regarding the
more » ... pic before learning how to address the examined problem through programming. This structure helped integrate into the course best practices from experiential learning, kinesthetic outreach activities, and active learning pedagogy. Utilizing this three-part rotation curriculum achieved some important goals, including holding the interest of students during the summer for six hours a day and successfully motivating students who had no programming background.
doi:10.1109/fie.2012.6462268 dblp:conf/fie/LayerST12 fatcat:kksh2uzinjhrjnp66pbrvi3uwy

Compatibility of partnered students in computer science education

Joshua Sennett, Mark Sherriff
2010 Proceedings of the 41st ACM technical symposium on Computer science education - SIGCSE '10  
This paper details the results of an investigation into the compatibility of partnered computer science students. The study involved approximately 290 students at the University of Virginia (UVA). This study builds on the work of researchers at North Carolina State University (NCSU). NCSU researchers have conducted a number of studies on the compatibility of pair programmers. We examined many of the factors that the NCSU researchers explored in their studies (including personality type,
more » ... style, skill level, programming self esteem, work ethic, and time management choices) in order to determine whether the conclusions of the research at NCSU also hold true at UVA. Consistent with the NCSU studies, we found that skill level continues to be the most important factor in student compatibility.
doi:10.1145/1734263.1734347 dblp:conf/sigcse/SennettS10 fatcat:pcjitzpwhncungqvsdsupi7alq

Empirical Software Change Impact Analysis using Singular Value Decomposition

Mark Sherriff, Laurie Williams
2008 2008 International Conference on Software Testing, Verification, and Validation  
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how files in the system tend to change together in response to fixes for identified faults and failures. We propose a methodology for determining the impact of a new system modification by analyzing software change records through singular value decomposition. This methodology generates clusters of files that historically
more » ... to change together to address faults and failures found in the code base. We performed a post hoc case study using this technique on five open source software systems. We determined that our technique was effective in identifying impacted files in a system from an introduced change when the developers tended to make small, targeted updates to the source system regularly. We further compared our technique against two other impact analysis techniques (PathImpact and CoverageImpact) and found that our technique provided comparable results, while also identifying non-source files that could be impacted by the change.
doi:10.1109/icst.2008.25 dblp:conf/icst/SherriffW08 fatcat:qcs4gm3l65eblnan6dqhjoqzcm

Early estimation of defect density using an in-process Haskell metrics model

Mark Sherriff, Nachiappan Nagappan, Laurie Williams, Mladen Vouk
2005 Software engineering notes  
Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software development process. This paper presents a suite of in-process metrics that leverages the software testing effort to create a defect density prediction model for use throughout the software development process. A case study conducted with Galois Connections, Inc. in a Haskell programming environment indicates that the
more » ... sulting defect density prediction is indicative of the actual system defect density.
doi:10.1145/1082983.1083285 fatcat:dzaegwfrlfdb7kywtk377hf7em

Role of larger software artifacts in introductory computer science courses

Oleg Krogius, Thomas B. Horton, Mark S. Sherriff
2010 2010 IEEE Frontiers in Education Conference (FIE)  
This paper compares the effectiveness of two approaches that can be used to teach concepts in introductory courses such as CS1 and CS2 -a conventional lecture-based approach and one using larger software programs (artifacts) with accompanying guided exercises. Our assessment includes measures of students' self-confidence as well as a measurement of their knowledge of the topics used in this study: inheritance and iterators. Finally, we consider some generalizations that can be made about these treatments and how well they perform.
doi:10.1109/fie.2010.5673385 fatcat:sdtctjqcz5g5fc2xujzycw5gmq

A Systematic Literature Review of Empiricism and Norms of Reporting in Computing Education Research Literature [article]

Sarah Heckman and Jeffrey C. Carver and Mark Sherriff and Ahmed Al-Zubidy
2021 arXiv   pre-print
Heckman, Carver, Sherriff, and Al-Zubidy See SIGCSE Board Program Chair Responsibilities policy at  ... 
arXiv:2107.01984v1 fatcat:42s5wtijszetxoes3qwzgwiwqy

Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records

Mark Sherriff, Mike Lake, Laurie Williams
2007 The 18th IEEE International Symposium on Software Reliability (ISSRE '07)  
During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same files that were just changed, since the effects of a change in the code base can have ramifications in other parts of the system. We propose a methodology for determining the effect of a change and then prioritizing regression test cases by gathering software change records and analyzing them through singular value
more » ... position. This methodology generates clusters of files that historically tend to change together. Combining these clusters with test case information yields a matrix that can be multiplied by a vector representing a new system modification to create a prioritized list of test cases. We performed a post hoc case study using this technique with three minor releases of a software product at IBM. We found that our methodology suggested additional regression tests in 50% of test runs and that the highest-priority suggested test found an additional fault 60% of the time.
doi:10.1109/issre.2007.25 dblp:conf/issre/SherriffLW07 fatcat:zucqp2mkuzgzvox5mro4aw4nue

Assessment of adult body composition using bioelectrical impedance: comparison of researcher calculated to machine outputted values

Maria Franco-Villoria, Charlotte M Wright, John H McColl, Andrea Sherriff, Mark S Pearce
2016 BMJ Open  
Objectives: To explore the usefulness of Bioelectrical Impedance Analysis (BIA) for general use by identifying best-evidenced formulae to calculate lean and fat mass, comparing these to historical gold standard data and comparing these results with machine-generated output. In addition, we explored how to best to adjust lean and fat estimates for height and how these overlapped with body mass index (BMI). Design: Cross-sectional observational study within population representative cohort study.
more » ... Setting: Urban community, North East England Participants: Sample of 506 mothers of children aged 7-8 years, mean age 36.3 years. Methods: Participants were measured at a home visit using a portable height measure and leg-to-leg BIA machine (Tanita TBF-300MA). Measures: Height, weight, bioelectrical impedance (BIA). Outcome measures: Lean and fat mass calculated using best-evidenced published formulae as well as machine-calculated lean and fat mass data. Results: Estimates of lean mass were similar to historical results using gold standard methods. When compared with the machine-generated values, there were wide limits of agreement for fat mass and a large relative bias for lean that varied with size. Lean and fat residuals adjusted for height differed little from indices of lean (or fat)/height 2 . Of 112 women with BMI >30 kg/m 2 , 100 (91%) also had high fat, but of the 16 with low BMI (<19 kg/m 2 ) only 5 (31%) also had low fat. Conclusions: Lean and fat mass calculated from BIA using published formulae produces plausible values and demonstrate good concordance between high BMI and high fat, but these differ substantially from the machine-generated values. Bioelectrical impedance can supply a robust and useful field measure of body composition, so long as the machine-generated output is not used. Franco-Villoria M, et al. BMJ Open 2016;6:e008922.
doi:10.1136/bmjopen-2015-008922 pmid:26743700 pmcid:PMC4716172 fatcat:7ttwhri44be2xdeekm2qvfnsua

A (Updated) Review of Empiricism at the SIGCSE Technical Symposium

Ahmed Al-Zubidy, Jeffrey C. Carver, Sarah Heckman, Mark Sherriff
2016 Proceedings of the 47th ACM Technical Symposium on Computing Science Education - SIGCSE '16  
The computer science education (CSEd) research community consists of a large group of passionate CS educators who often contribute to other disciplines of CS research. There has been a trend in other disciplines toward more rigorous and empirical evaluation of various hypotheses. Prior investigations of the thencurrent state of CSEd research showed a distinct lack of rigor in the top research publication venues, with most papers falling in the general category of experience reports. In this
more » ... r, we present our examination of the two most recent proceedings of the SIGCSE Technical Symposium, providing a snapshot of the current state of empiricism at the largest CSEd venue. Our goal to categorize the current state of empiricism in the SIGCSE Technical Symposium and identify where the community might benefit from increased empiricism when conducting CSEd research. We found an increase in empirical validation of CSEd research to over 70%; however, our findings suggest that current CSEd research minimizes replication precluding meta-analysis and theory building. Keywords Systematic literature review, empirical computer science education, scholarship of teaching and learning.
doi:10.1145/2839509.2844601 dblp:conf/sigcse/Al-ZubidyCHS16 fatcat:7uhigiaf2fbhlpzuhkg5jqdt6y
« Previous Showing results 1 — 15 out of 1,361 results