-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathbibliography.bib
4945 lines (4644 loc) · 458 KB
/
bibliography.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
@article{abutairMiningEducationalData2012,
title = {Mining Educational Data to Improve Students' Performance: A Case Study},
shorttitle = {Mining Educational Data to Improve Students' Performance},
author = {Abu Tair, Mohammed M. and {El-Halees}, Alaa M.},
year = {2012},
journal = {{International Journal of Information}},
volume = {Volume: 2, Number: 2},
number = {Volume: 2, Number: 2},
url = {https://iugspace.iugaza.edu.ps/handle/20.500.12358/25066},
urldate = {2021-09-20},
abstract = {Educational data mining concerns with developing methods for discovering knowledge from data that come from educational domain. In this paper we used educational data mining to improve graduate students' performance, and overcome the problem of low grades of graduate students. In our case study we try to extract useful knowledge from graduate students data collected from the college of Science and Technology--Khanyounis. The data include fifteen years period [1993-2007]. After preprocessing the data, we applied data mining techniques to discover association, classification, clustering and outlier detection rules. In each of these four tasks, we present the extracted knowledge and describe its importance in educational domain.},
copyright = {Creative Commons (CC-BY)},
langid = {english},
annotation = {Accepted: 2018-11-19T09:24:34Z},
file = {/home/charlotte/sync/Zotero/storage/UTI4XVZ2/Abu Tair and El-Halees - 2012 - Mining educational data to improve students' perfo.pdf;/home/charlotte/sync/Zotero/storage/II5LNING/25066.html}
}
@article{akcapinarUsingLearningAnalytics2019,
title = {Using Learning Analytics to Develop Early-Warning System for at-Risk Students},
author = {Ak{\c c}ap{\i}nar, G{\"o}khan and Altun, Arif and A{\c s}kar, Petek},
year = {2019},
month = oct,
journal = {{International Journal of Educational Technology in Higher Education}},
volume = {16},
number = {1},
pages = {40},
issn = {2365-9440},
doi = {10.1186/s41239-019-0172-z},
url = {https://doi.org/10.1186/s41239-019-0172-z},
urldate = {2024-02-14},
abstract = {In the current study interaction data of students in an online learning setting was used to research whether the academic performance of students at the end of term could be predicted in the earlier weeks. The study was carried out with 76\,second-year university students registered in a Computer Hardware course. The study aimed to answer two principle questions: which algorithms and features best predict the end of term academic performance of students by comparing different classification algorithms and pre-processing techniques and whether or not academic performance can be predicted in the earlier weeks using these features and the selected algorithm. The results of the study indicated that the kNN algorithm accurately predicted unsuccessful students at the end of term with a rate of 89\%. When findings were examined regarding the analysis of data obtained in weeks 3, 6, 9, 12,~and 14~to predict whether the end-of-term academic performance of students could be predicted in the earlier weeks, it was observed that students who were unsuccessful at the end of term could be predicted with a rate of 74\% in as short as 3\,weeks' time. The findings obtained from this study are important for the determination of features for early warning systems that can be developed for online learning systems and as indicators of student success. At the same time, it will aid researchers in the selection of algorithms and pre-processing techniques in the analysis of educational data.},
langid = {english},
keywords = {Academic performance prediction,At-risk students,Early-warning systems,Educational data mining,Learning analytics,Online learning},
file = {/home/charlotte/sync/Zotero/storage/C58SJ23T/Akçapınar et al. - 2019 - Using learning analytics to develop early-warning .pdf;/home/charlotte/sync/Zotero/storage/RMSJIVAI/[email protected]}
}
@article{akcayirFlippedClassroomReview2018,
title = {The Flipped Classroom: {{A}} Review of Its Advantages and Challenges},
shorttitle = {The Flipped Classroom},
author = {Ak{\c c}ay{\i}r, G{\"o}k{\c c}e and Ak{\c c}ay{\i}r, Murat},
year = {2018},
month = nov,
journal = {{Computers \& Education}},
volume = {126},
pages = {334--345},
issn = {0360-1315},
doi = {10.1016/j.compedu.2018.07.021},
url = {https://www.sciencedirect.com/science/article/pii/S0360131518302045},
urldate = {2022-08-16},
abstract = {This study presents a large-scale systematic review of the literature on the flipped classroom, with the goals of examining its reported advantages and challenges for both students and instructors, and to note potentially useful areas of future research on the flipped model's in and out-of-class activities. The full range of Social Sciences Citation Indexed journals was surveyed through the Web of Science site, and a total of 71 research articles were selected for the review. The findings reveal that the most frequently reported advantage of the flipped classroom is the improvement of student learning performance. We also found a number of challenges in this model. The majority of these are related to out-of-class activities, such as much reported inadequate student preparation prior to class. Several other challenges and the numerous advantages of the flipped classroom are discussed in detail. We then offer suggestions for future research on flipped model activities.},
langid = {english},
keywords = {Improving classroom teaching,Teaching/learning strategies},
file = {/home/charlotte/sync/Zotero/storage/A7LBQIEQ/Akçayır and Akçayır - 2018 - The flipped classroom A review of its advantages .pdf;/home/charlotte/sync/Zotero/storage/A6Q8IY3R/S0360131518302045.html}
}
@article{ala-mutkaSurveyAutomatedAssessment2005,
title = {A {{Survey}} of {{Automated Assessment Approaches}} for {{Programming Assignments}}},
author = {{Ala-Mutka}, Kirsti M},
year = {2005},
month = jun,
journal = {{Computer Science Education}},
volume = {15},
number = {2},
pages = {83--102},
publisher = {Routledge},
issn = {0899-3408},
doi = {10.1080/08993400500150747},
url = {https://doi.org/10.1080/08993400500150747},
urldate = {2022-08-16},
abstract = {Practical programming is one of the basic skills pursued in computer science education. On programming courses, the coursework consists of programming assignments that need to be assessed from different points of view. Since the submitted assignments are executable programs with a formal structure, some features can be assessed automatically. The basic requirement for automated assessment is the numerical measurability of assessment targets, but semiautomatic approaches can overcome this restriction. Recognizing automatically assessable features can help teachers to create educational models, where automatic tools let teachers concentrate their work on the learning issues that need student-teacher interaction the most. Several automatic tools for both static and dynamic assessment of computer programs have been reported in the literature. This article promotes these issues by surveying several automatic approaches for assessing programming assignments. Not all the existing tools will be covered, simply because of the vast number of them. The article concentrates on bringing forward different assessment techniques and approaches to give an interested reader starting points for finding further information in the area. Automatic assessment tools can be used to help teachers in grading tasks as well as to support students' working process with automatic feedback. Common advantages of automation are the speed, availability, consistency and objectivity of assessment. However, automatic tools emphasize the need for careful pedagogical design of the assignment and assessment settings. To effectively share the knowledge and good assessment solutions already developed, better interoperability and portability of the tools is needed.}
}
@inproceedings{albashairehSurveyOnlineLearning2018,
title = {A {{Survey}} of {{Online Learning Platforms}} with {{Initial Investigation}} of {{Situation-Awareness}} to {{Facilitate Programming Education}}},
booktitle = {2018 {{International Conference}} on {{Computational Science}} and {{Computational Intelligence}} ({{CSCI}})},
author = {Albashaireh, Rasha and Ming, Hua},
year = {2018},
month = dec,
pages = {631--637},
doi = {10.1109/CSCI46756.2018.00126},
url = {https://ieeexplore.ieee.org/abstract/document/8947659},
urldate = {2023-10-02},
abstract = {With the advancement of today's ubiquitous technology, and due to the increasing number of technologies supported by the Internet, a variety of Online Learning Platforms have rapidly grown as modern learning methods. This fast-emerging learning option interests researchers to study and investigate the main features and functionality of the most popular Online Learning Platforms. This paper surveys the state-of-the-art Online Learning Platforms that aim to teach computer programming, in terms of principles, design, and implementations. In addition, the paper investigates the feasibility of incorporating human-oriented Situation-Awareness as the driving factor to facilitate the delivery of improved user learning experiences.},
file = {/home/charlotte/sync/Zotero/storage/T767PWYN/Albashaireh and Ming - 2018 - A Survey of Online Learning Platforms with Initial.pdf;/home/charlotte/sync/Zotero/storage/P34UIQEK/8947659.html}
}
@inproceedings{alfadelUseDependabotSecurity2021,
title = {On the {{Use}} of {{Dependabot Security Pull Requests}}},
booktitle = {2021 {{IEEE}}/{{ACM}} 18th {{International Conference}} on {{Mining Software Repositories}} ({{MSR}})},
author = {Alfadel, Mahmoud and Costa, Diego Elias and Shihab, Emad and Mkhallalati, Mouafak},
year = {2021},
month = may,
pages = {254--265},
issn = {2574-3864},
doi = {10.1109/MSR52588.2021.00037},
abstract = {Vulnerable dependencies are a major problem in modern software development. As software projects depend on multiple external dependencies, developers struggle to constantly track and check for corresponding security vulnerabilities that affect their project dependencies. To help mitigate this issue, Dependabot has been created, a bot that issues pull-requests to automatically update vulnerable dependencies. However, little is known about the degree to which developers adopt Dependabot to help them update vulnerable dependencies.In this paper, we investigate 2,904 JavaScript open-source GitHub projects that subscribed to Dependabot. Our results show that the vast majority (65.42\%) of the created security-related pull-requests are accepted, often merged within a day. Through manual analysis, we identify 7 main reasons for Dependabot security pull-requests not being merged, mostly related to concurrent modifications of the affected dependencies rather than Dependabot failures. Interestingly, only 3.2\% of the manually examined pull-requests suffered from build breakages. Finally, we model the time it takes to merge a Dependabot security pull-request using characteristics from projects, the fixed vulnerabilities and issued pull requests. Our model reveals 5 significant features to explain merge times, e.g., projects with relevant experience with Dependabot security pull-requests are most likely associated with rapid merges. Surprisingly, the severity of the dependency vulnerability and the potential risk of breaking changes are not strongly associated with the merge time. To the best of our knowledge, this study is the first to evaluate how developers receive Dependabot's security contributions. Our findings indicate that Dependabot provides an effective platform for increasing awareness of dependency vulnerabilities and helps developers mitigate vulnerability threats in JavaScript projects.},
keywords = {Data mining,Dependabot,dependency,Manuals,Open source software,pull request,Security,security vulnerability,Software development management},
file = {/home/charlotte/sync/Zotero/storage/UWVKGK2D/Alfadel et al. - 2021 - On the Use of Dependabot Security Pull Requests.pdf;/home/charlotte/sync/Zotero/storage/398DZ2EZ/9463148.html}
}
@article{andersonFairnessReactionsPersonnel2008,
title = {Fairness {{Reactions}} to {{Personnel Selection Methods}}: {{An}} International Comparison between the {{Netherlands}}, the {{United States}}, {{France}}, {{Spain}}, {{Portugal}}, and {{Singapore}}},
shorttitle = {Fairness {{Reactions}} to {{Personnel Selection Methods}}},
author = {Anderson, Neil and Witvliet, Carlijn},
year = {2008},
journal = {{International Journal of Selection and Assessment}},
volume = {16},
number = {1},
pages = {1--13},
issn = {1468-2389},
doi = {10.1111/j.1468-2389.2008.00404.x},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-2389.2008.00404.x},
urldate = {2021-04-30},
abstract = {This paper reports reactions to employee selection methods in the Netherlands and compares these findings internationally against six other previously published samples covering the United States, France, Spain, Portugal, and Singapore. A sample of 167 participants rated 10 popular assessment techniques using a translated version of Steiner and Gilliland's measure. In common with other country samples, we found that the most popular methods among applicants were interviews, work sample tests, and resumes. Least popular methods were graphology, personal contacts, and honesty and integrity tests. Generally, method favorability was found to be highly similar to the US and other published studies internationally. Across the six countries mean process favorability correlated at .87 and mean cross-national procedural justice correlated .68. Process dimension ratings correlated at between .79 and .97 between the United States and the Netherlands. Only medium effect size differences (Cohen's d) were found between Dutch and US reactions to resumes and personality tests, the former being more favorably rated in the United States (d=.62) and the latter being more positively rated in the Netherlands (d=-.76). Implications for the design of selection procedures are discussed, especially implications for likely similarities and differences in applicant reactions internationally.},
langid = {english},
file = {/home/charlotte/sync/Zotero/storage/5B4GS4EW/Anderson and Witvliet - 2008 - Fairness Reactions to Personnel Selection Methods.pdf;/home/charlotte/sync/Zotero/storage/9ENV6EED/j.1468-2389.2008.00404.html}
}
@article{andrade-arenasUniversityLearningStyle2023,
title = {University Learning Style Model: {{Bibliometrics}} and Systematic Literature Review},
shorttitle = {University Learning Style Model},
author = {{Andrade-Arenas}, Laberiano and Bogdanovich, Mar{\'i}a Mini Martin and Celis, Domingo Hern{\'a}ndez and Jaico, Katerine Romero and Pe{\~n}a, Gustavo Bernnet Alfaro},
year = {2023},
month = dec,
journal = {{International Journal of Evaluation and Research in Education (IJERE)}},
volume = {12},
number = {4},
pages = {2302--2315},
issn = {2620-5440},
doi = {10.11591/ijere.v12i4.25859},
url = {https://ijere.iaescore.com/index.php/IJERE/article/view/25859},
urldate = {2023-12-04},
abstract = {The university learning style worldwide was analyzed to obtain a model adapted to Peru, that was complemented in the initial part with the study of the biliometric analysis. In the first steps that were developed, the information search was done in a general way with Scopus. Then specifically adding the Dimensions database, obtaining 59 items from the selection. The Prism statement was used, which allowed it to be developed in the methodology sequentially until the selected articles were obtained. The objective was to carry out a study of the systematic review of the literature (RSL) that allowed analysis by categories such as academic performance, teaching strategy and competencies related to the learning style. Where the data obtained was with the use of VOSviewer and Rstudio. The result obtained was an innovative model that relates the categories with the most relevant models that studied the learning style. As a conclusion, the different learning styles can be adapted to the different study programs and their different courses to plan it from the macrocurricular to the microcurricular, taking into account the strategy and the didactics of teaching, the contribution for the university sector.},
copyright = {Copyright (c) 2023 Institute of Advanced Engineering and Science},
langid = {english},
keywords = {Academic performance,Competencies,Learning style,Prism statement,Teaching strategy},
file = {/home/charlotte/sync/Zotero/storage/BYGS8IMH/Andrade-Arenas et al. - 2023 - University learning style model Bibliometrics and.pdf}
}
@article{asaiEfficientSubstructureDiscovery2004,
title = {Efficient {{Substructure Discovery}} from {{Large Semi-Structured Data}}},
author = {Asai, Tatsuya and Abe, Kenji and Kawasoe, Shinji and Sakamoto, Hiroshi and Arimura, Hiroki and Arikawa, Setsuo},
year = {2004},
month = dec,
journal = {{IEICE TRANSACTIONS on Information and Systems}},
volume = {E87-D},
number = {12},
pages = {2754--2763},
publisher = {{The Institute of Electronics, Information and Communication Engineers}},
issn = {, 0916-8532},
url = {https://search.ieice.org/bin/summary.php?id=e87-d_12_2754&category=D&year=2004&lang=E&abst=},
urldate = {2022-07-06},
abstract = {In this paper, we consider a data mining problem for semi-structured data. Modeling semi-structured data as labeled ordered trees, we present an efficient algorithm for discovering frequent substructures from a large collection of semi-structured data. By extending the enumeration technique developed by Bayardo (SIGMOD'98) for discovering long itemsets, our algorithm scales almost linearly in the total size of maximal tree patterns contained in an input collection depending mildly on the size of the longest pattern. We also developed several pruning techniques that significantly speed-up the search. Experiments on Web data show that our algorithm runs efficiently on real-life datasets combined with proposed pruning techniques in the wide range of parameters.},
file = {/home/charlotte/sync/Zotero/storage/I46PGVCC/Asai et al. - 2004 - Efficient Substructure Discovery from Large Semi-S.pdf;/home/charlotte/sync/Zotero/storage/PNH8LAUL/summary.html}
}
@article{asifAnalyzingUndergraduateStudents2017,
title = {Analyzing Undergraduate Students' Performance Using Educational Data Mining},
author = {Asif, Raheela and Merceron, Agathe and Ali, Syed Abbas and Haider, Najmi Ghani},
year = {2017},
month = oct,
journal = {{Computers \& Education}},
volume = {113},
pages = {177--194},
issn = {0360-1315},
doi = {10.1016/j.compedu.2017.05.007},
url = {https://www.sciencedirect.com/science/article/pii/S0360131517301124},
urldate = {2021-02-19},
abstract = {The tremendous growth in electronic data of universities creates the need to have some meaningful information extracted from these large volumes of data. The advancement in the data mining field makes it possible to mine educational data in order to improve the quality of the educational processes. This study, thus, uses data mining methods to study the performance of undergraduate students. Two aspects of students' performance have been focused upon. First, predicting students' academic achievement at the end of a four-year study programme. Second, studying typical progressions and combining them with prediction results. Two important groups of students have been identified: the low and high achieving students. The results indicate that by focusing on a small number of courses that are indicators of particularly good or poor performance, it is possible to provide timely warning and support to low achieving students, and advice and opportunities to high performing students.},
langid = {english},
keywords = {Clustering,Data mining,Decision trees,Performance prediction,Performance progression,Quality of educational processes},
file = {/home/charlotte/sync/Zotero/storage/MFBFQAE3/Asif et al. - 2017 - Analyzing undergraduate students' performance usin.pdf;/home/charlotte/sync/Zotero/storage/LMS96U8D/S0360131517301124.html}
}
@article{averySimilarityRankingPython2015,
title = {A {{Similarity Ranking}} of {{Python Programs}}},
author = {Avery, Jonathan Wardell},
year = {2015},
publisher = {University of Canterbury},
url = {https://ir.canterbury.ac.nz/handle/10092/14446},
urldate = {2022-07-06},
abstract = {Detection of similar programs is a highly studied problem. Detecting similar code is an important strategy for detecting badly modularized code, finding vulnerabilities due to error prone copy-paste programming methodologies, and detecting academic dishonesty in online code assignment submissions following the copy-paste-adapt-it pattern. The latter is the impetus for this work. A novel system is presented that is specifically adapted to programs that may be small, and similar by virtue of being written to solve the same problem. The system is also adapted toward specific expected behaviors of plagiarists, making use of algorithms custom built to both recognize these behaviors while satisfying hierarchical properties. A defining and novel property of the proposed method is the categorical information it provides. A hierarchy of categories with an implication relationship are leveraged in the production of descriptive, rank-able results.},
copyright = {All Right Reserved},
langid = {english},
annotation = {Accepted: 2017-10-03T02:53:23Z},
file = {/home/charlotte/sync/Zotero/storage/3SWAEQHJ/Avery - 2015 - A Similarity Ranking of Python Programs.pdf;/home/charlotte/sync/Zotero/storage/83HXZXCM/14446.html}
}
@incollection{bakerEducationalDataMining2016,
title = {Educational {{Data Mining}} and {{Learning Analytics}}},
booktitle = {The {{Wiley Handbook}} of {{Cognition}} and {{Assessment}}},
author = {Baker, Ryan S. and Martin, Taylor and Rossi, Lisa M.},
year = {2016},
pages = {379--396},
publisher = {John Wiley \& Sons, Ltd},
doi = {10.1002/9781118956588.ch16},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/9781118956588.ch16},
urldate = {2024-05-08},
abstract = {In recent years, there has been increasing interest in using the methods of educational data mining (EDM) and learning analytics (LA) to study and measure learner cognition. In this chapter, we discuss how these types of methods can be used to measure complex cognition and meta-cognition in types of environments where inference can be challenging: exploratory and inquiry learning environments, complex games, and project-based learning. We give examples from a range of projects for the types of constructs that can be inferred using EDM/LA methods and how these measures compare to what can be obtained from more traditional methods. We conclude with a discussion of future discussion and potentials for these kinds of methods.},
chapter = {16},
copyright = {{\copyright} 2017 John Wiley \& Sons, Inc.},
isbn = {978-1-118-95658-8},
langid = {english},
keywords = {complex games,educational data mining,educational measurement,exploratory learning environments,inquiry learning environments,learning analytics},
file = {/home/charlotte/sync/Zotero/storage/L5U4ZHN5/Baker et al. - 2016 - Educational Data Mining and Learning Analytics.pdf;/home/charlotte/sync/Zotero/storage/ES2FJTYW/9781118956588.html}
}
@article{bakerStateEducationalData2009,
title = {The {{State}} of {{Educational Data Mining}} in 2009: {{A Review}} and {{Future Visions}}},
shorttitle = {The {{State}} of {{Educational Data Mining}} in 2009},
author = {Baker, Ryan SJD and Yacef, Kalina},
year = {2009},
month = oct,
journal = {{Journal of Educational Data Mining}},
volume = {1},
number = {1},
pages = {3--17},
issn = {2157-2100},
doi = {10.5281/zenodo.3554657},
url = {https://jedm.educationaldatamining.org},
urldate = {2021-04-30},
copyright = {Copyright (c) 2014 JEDM - Journal of Educational Data Mining},
langid = {english},
keywords = {clustering,discovery with models,educational data mining,prediction,relationship mining,visualization},
file = {/home/charlotte/sync/Zotero/storage/49E82ICH/Baker and Yacef - 2009 - The State of Educational Data Mining in 2009 A Re.pdf;/home/charlotte/sync/Zotero/storage/2QTQLSQD/8.html}
}
@article{barabDesignBasedResearchPutting2004,
title = {Design-{{Based Research}}: {{Putting}} a {{Stake}} in the {{Ground}}},
shorttitle = {Design-{{Based Research}}},
author = {Barab, Sasha and Squire, Kurt},
year = {2004},
month = jan,
journal = {{Journal of the Learning Sciences}},
volume = {13},
number = {1},
pages = {1--14},
publisher = {Routledge},
issn = {1050-8406},
doi = {10.1207/s15327809jls1301_1},
url = {https://doi.org/10.1207/s15327809jls1301_1},
urldate = {2021-09-15},
file = {/home/charlotte/sync/Zotero/storage/I5L3SPUC/Barab and Squire - 2004 - Design-Based Research Putting a Stake in the Grou.pdf;/home/charlotte/sync/Zotero/storage/AMUNRJ5E/s15327809jls1301_1.html}
}
@inproceedings{bareissCoachingCognitiveApprenticeship2010,
title = {Coaching via Cognitive Apprenticeship},
booktitle = {Proceedings of the 41st {{ACM}} Technical Symposium on {{Computer}} Science Education},
author = {Bareiss, Ray and Radley, Martin},
year = {2010},
month = mar,
series = {{{SIGCSE}} '10},
pages = {162--166},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/1734263.1734319},
url = {https://doi.org/10.1145/1734263.1734319},
urldate = {2022-02-24},
abstract = {At Carnegie Mellon's Silicon Valley campus we employ a learn-by-doing educational approach in which nearly all student learning, and thus instruction, is in the context of realistic, team-based projects. Consequently, we have adopted coaching as our predominant teaching model. In this paper we reflect on our experience with the nature of teaching by coaching using a framework derived from Cognitive Apprenticeship, and explain how we employ the techniques it suggests in our teaching. We also discuss a range of instructional tensions that arise in teaching by coaching and present a survey of student attitudes regarding the effectiveness of our approach.},
isbn = {978-1-4503-0006-3},
keywords = {active learning,cognitive apprenticeship,cs ed research,experience report,graduate studies,information systems,instructional technologies,learning by doing,professional practice,software engineering,story-centered curricula},
file = {/home/charlotte/sync/Zotero/storage/RHAWWHCQ/Bareiss and Radley - 2010 - Coaching via cognitive apprenticeship.pdf}
}
@inproceedings{barendsenNewInformaticsCurriculum2016,
title = {A {{New Informatics Curriculum}} for {{Secondary Education}} in {{The Netherlands}}},
booktitle = {Informatics in {{Schools}}: {{Improvement}} of {{Informatics Knowledge}} and {{Perception}}},
author = {Barendsen, Erik and Grgurina, Nata{\v s}a and Tolboom, Jos},
editor = {Brodnik, Andrej and Tort, Fran{\c c}oise},
year = {2016},
series = {Lecture {{Notes}} in {{Computer Science}}},
pages = {105--117},
publisher = {Springer International Publishing},
address = {Cham},
doi = {10.1007/978-3-319-46747-4_9},
abstract = {In The Netherlands, the current informatics curriculum for upper secondary education was introduced in 1998 and only slightly modified in 2007. Meanwhile, both the scientific discipline and its impact on society have developed substantially. For this main reason, a curriculum reform has been carried out which has led to a new curriculum specifying the intended learning outcomes. This country report specifies the educational context in which the reform takes place. Moreover, it decribes the reform process from various perspectives, highlights and explains the underlying design principles that guided the development of the new curriculum, and presents its main results.},
isbn = {978-3-319-46747-4},
langid = {english},
keywords = {Curriculum,Informatics,Reform,Secondary education},
file = {/home/charlotte/sync/Zotero/storage/ENYGLNEI/barendsen2016.pdf.pdf;/home/charlotte/sync/Zotero/storage/UTTBGSTP/Barendsen et al. - 2016 - A New Informatics Curriculum for Secondary Educati.pdf}
}
@article{baresiIntroductionSoftwareTesting2006,
title = {An {{Introduction}} to {{Software Testing}}},
author = {Baresi, Luciano and Pezz{\`e}, Mauro},
year = {2006},
month = feb,
journal = {{Electronic Notes in Theoretical Computer Science}},
series = {Proceedings of the {{School}} of {{SegraVis Research Training Network}} on {{Foundations}} of {{Visual Modelling Techniques}} ({{FoVMT}} 2004)},
volume = {148},
number = {1},
pages = {89--111},
issn = {1571-0661},
doi = {10.1016/j.entcs.2005.12.014},
url = {https://www.sciencedirect.com/science/article/pii/S1571066106000442},
urldate = {2022-03-03},
abstract = {The development of large software systems is a complex and error prone process. Faults might occur at any development stage and they must be identified and removed as early as possible to stop their propagation and reduce verification costs. Quality engineers must be involved in the development process since the very early phases to identify required qualities and estimate their impact on the development process. Their tasks span over the whole development cycle and go beyond the product deployment through maintenance and post mortem analysis. Developing and enacting an effective quality process is not a simple task, but it requires that we integrate many quality-related activities with product characteristics, process organization, available resources and skills, and budget constraints. This paper discusses the main characteristics of a good quality process, then surveys the key testing phases and presents modern functional and model-based testing approaches.},
langid = {english},
keywords = {Functional Testing,Integration Testing,Model-based Testing,Software Quality,Software Testing,System and Acceptance Testing},
file = {/home/charlotte/sync/Zotero/storage/J8N9PBZ7/Baresi and Pezzè - 2006 - An Introduction to Software Testing.pdf;/home/charlotte/sync/Zotero/storage/UHP7GGL3/S1571066106000442.html}
}
@inproceedings{beckerCompilerErrorMessages2019,
title = {Compiler {{Error Messages Considered Unhelpful}}: {{The Landscape}} of {{Text-Based Programming Error Message Research}}},
shorttitle = {Compiler {{Error Messages Considered Unhelpful}}},
booktitle = {Proceedings of the {{Working Group Reports}} on {{Innovation}} and {{Technology}} in {{Computer Science Education}}},
author = {Becker, Brett A. and Denny, Paul and Pettit, Raymond and Bouchard, Durell and Bouvier, Dennis J. and Harrington, Brian and Kamil, Amir and Karkare, Amey and McDonald, Chris and Osera, Peter-Michael and Pearce, Janice L. and Prather, James},
year = {2019},
month = dec,
series = {{{ITiCSE-WGR}} '19},
pages = {177--210},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3344429.3372508},
url = {https://doi.org/10.1145/3344429.3372508},
urldate = {2022-02-21},
abstract = {Diagnostic messages generated by compilers and interpreters such as syntax error messages have been researched for over half of a century. Unfortunately, these messages which include error, warning, and run-time messages, present substantial difficulty and could be more effective, particularly for novices. Recent years have seen an increased number of papers in the area including studies on the effectiveness of these messages, improving or enhancing them, and their usefulness as a part of programming process data that can be used to predict student performance, track student progress, and tailor learning plans. Despite this increased interest, the long history of literature is quite scattered and has not been brought together in any digestible form. In order to help the computing education community (and related communities) to further advance work on programming error messages, we present a comprehensive, historical and state-of-the-art report on research in the area. In addition, we synthesise and present the existing evidence for these messages including the difficulties they present and their effectiveness. We finally present a set of guidelines, curated from the literature, classified on the type of evidence supporting each one (historical, anecdotal, and empirical). This work can serve as a starting point for those who wish to conduct research on compiler error messages, runtime errors, and warnings. We also make the bibtex file of our 300+ reference corpus publicly available. Collectively this report and the bibliography will be useful to those who wish to design better messages or those that aim to measure their effectiveness, more effectively.},
isbn = {978-1-4503-7567-2},
keywords = {compiler error messages,considered harmful,cs-1,cs1,design guidelines,diagnostic error messages,error messages,hci,human computer interaction,introduction to programming,novice programmers,programming error messages,programming errors,review,run-time errors,survey,syntax errors,warnings},
file = {/home/charlotte/sync/Zotero/storage/WCKRFVLW/Becker et al. - 2019 - Compiler Error Messages Considered Unhelpful The .pdf}
}
@article{bellConnectivismItsPlace2011,
title = {Connectivism: {{Its Place}} in {{Theory-Informed Research}} and {{Innovation}} in {{Technology-Enabled Learning}}},
shorttitle = {Connectivism},
author = {Bell, Frances},
year = {2011},
journal = {{International Review of Research in Open and Distributed Learning}},
volume = {12},
number = {3},
pages = {98--118},
publisher = {Athabasca University Press (AU Press)},
issn = {1492-3831},
doi = {10.19173/irrodl.v12i3.902},
url = {https://www.erudit.org/en/journals/irrodl/2011-v12-n3-irrodl05132/1067617ar/},
urldate = {2022-08-16},
abstract = {The sociotechnical context for learning and education is dynamic and makes great demands on those trying to seize the opportunities presented by emerging technologies. The goal of this paper is to explore certain theories for our plans and actions in technology-enabled learning. Although presented as a successor to previous learning theories, connectivism alone is insufficient to inform learning and its support by technology in an internetworked world. However, because of its presence in massive open online courses (MOOCs), connectivism is influential in the practice of those who take these courses and who wish to apply it in teaching and learning. Thus connectivism is perceived as relevant by its practitioners but as lacking in rigour by its critics. Five scenarios of change are presented with frameworks of different theories to explore the variety of approaches educators can take in the contexts for change and their associated research/evaluation. I argue that the choice of which theories to use depends on the scope and purposes of the intervention, the funding available to resource the research/evaluation, and the experience and philosophical stances of the researchers/practitioners.},
langid = {english},
keywords = {activity theory,actor network theory,change management,connectivism,evaluation,implementation,learning,research,social shaping of technology,theory,zone of proximal development},
file = {/home/charlotte/sync/Zotero/storage/BPH3T7WF/Bell - 2011 - Connectivism Its Place in Theory-Informed Researc.pdf;/home/charlotte/sync/Zotero/storage/W85J63KC/abstract.html}
}
@article{ben-ariConstructivismComputerScience2001,
title = {Constructivism in {{Computer Science Education}}},
author = {{Ben-Ari}, Mordechai},
year = {2001},
journal = {{Journal of Computers in Mathematics and Science Teaching}},
volume = {20},
number = {1},
pages = {45--73},
publisher = {Association for the Advancement of Computing in Education (AACE)},
issn = {0731-9258},
url = {https://www.learntechlib.org/primary/p/8505/},
urldate = {2022-02-24},
abstract = {Constructivism is a theory of learning, which claims that stu-dents construct knowledge rather than merely receive and store knowledge transmitted by the teacher. Constructivism has been extremely influential in science and mathematics education, but much less so in computer science education (CSE). This paper surveys constructivism in the context of CSE, and shows how the theory can supply a theoretical ba-sis for debating issues and evaluating proposals. An analysis of constructivism in computer science education leads to two claims: (a) students do not have an effective model of...},
langid = {english},
file = {/home/charlotte/sync/Zotero/storage/4MGZUI2N/8505.html}
}
@inproceedings{benacearleAutomaticGradingProgramming2016,
title = {Automatic {{Grading}} of {{Programming Exercises}} Using {{Property-Based Testing}}},
booktitle = {Proceedings of the 2016 {{ACM Conference}} on {{Innovation}} and {{Technology}} in {{Computer Science Education}}},
author = {Benac Earle, Clara and Fredlund, Lars-{\AA}ke and Hughes, John},
year = {2016},
month = jul,
series = {{{ITiCSE}} '16},
pages = {47--52},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/2899415.2899443},
url = {https://dl.acm.org/doi/10.1145/2899415.2899443},
urldate = {2023-10-05},
abstract = {We present a framework for automatic grading of programming exercises using property-based testing, a form of model-based black-box testing. Models are developed to assess both the functional behaviour of programs and their algorithmic complexity. From the functional correctness model a large number of test cases are derived automatically. Executing them on the body of exercises gives rise to a (partial) ranking of programs, so that a program A is ranked higher than program B if it fails a strict subset of the test cases failed by B. The model for algorithmic complexity is used to compute worst-case complexity bounds. The framework moreover considers code structural metrics, such as McCabe's cyclomatic complexity, giving rise to a composite program grade that includes both functional, non-functional, and code structural aspects. The framework is evaluated in a course teaching algorithms and data structures using Java.},
isbn = {978-1-4503-4231-5},
keywords = {automated assessment,java,testing},
file = {/home/charlotte/sync/Zotero/storage/8EPYGW7V/Benac Earle et al. - 2016 - Automatic Grading of Programming Exercises using P.pdf}
}
@article{bennedsenFailureRatesIntroductory2007,
title = {Failure Rates in Introductory Programming},
author = {Bennedsen, Jens and Caspersen, Michael E.},
year = {2007},
month = jun,
journal = {{ACM SIGCSE Bulletin}},
volume = {39},
number = {2},
pages = {32--36},
issn = {0097-8418},
doi = {10.1145/1272848.1272879},
url = {https://doi.org/10.1145/1272848.1272879},
urldate = {2021-02-19},
abstract = {It is a common conception that CS1 is a very difficult course and that failure rates are high. However, until now there has only been anecdotal evidence for this claim. This article reports on a survey among institutions around the world regarding failure rates in introductory programming courses. The article describes the design of the survey and the results. The number of institutions answering the call for data was unfortunately rather low, so it is difficult to make firm conclusions. It is our hope that this article can be the starting point for a systematic collection of data in order to find solid proof of the actual failure and pass rates of CS1.},
keywords = {CS1,failure rate,introductory programming,pass rate},
file = {/home/charlotte/sync/Zotero/storage/LQXT69IA/Bennedsen and Caspersen - 2007 - Failure rates in introductory programming.pdf}
}
@inproceedings{bennedsenProgrammingContextModelfirst2004,
title = {Programming in Context: A Model-First Approach to {{CS1}}},
shorttitle = {Programming in Context},
booktitle = {Proceedings of the 35th {{SIGCSE}} Technical Symposium on {{Computer}} Science Education},
author = {Bennedsen, Jens and Caspersen, Michael E.},
year = {2004},
month = mar,
series = {{{SIGCSE}} '04},
pages = {477--481},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/971300.971461},
url = {https://doi.org/10.1145/971300.971461},
urldate = {2022-02-24},
abstract = {The recommendations of the Joint Task Force on Computing Curricula 2001 encompass suggestions for an object-first introductory programming course. We have identified conceptual modeling as a lacking perspective in the suggestions for CS1. Conceptual modeling is the defining characteristic of object-orientation and provides a unifying perspective and a pedagogical approach focusing upon the modelling aspects of object-orientation. Reinforcing conceptual modelling as a basis for CS1 provides an appealing course structure based on core elements from a conceptual framework for object-orientation as well as a systematic approach to programming; both of these are a big help to newcomers. The approach has a very positive impact on the number of students passing the course.},
isbn = {978-1-58113-798-9},
keywords = {conceptual modelling,CS1,design,objects-first,pedagogy,programming education,systematic programming,UML},
file = {/home/charlotte/sync/Zotero/storage/IMAEDND9/Bennedsen and Caspersen - 2004 - Programming in context a model-first approach to .pdf}
}
@article{berners-leeWorldWideWeb1992,
title = {World-{{Wide Web}}: {{The Information Universe}}},
shorttitle = {World-{{Wide Web}}},
author = {Berners-Lee, Tim and Cailliau, Robert and Groff, Jean-Fran{\c c}ois and Pollermann, Bernd},
year = {1992},
month = jan,
journal = {{Internet Research}},
volume = {2},
number = {1},
pages = {52--58},
publisher = {MCB UP Ltd},
issn = {1066-2243},
doi = {10.1108/eb047254},
url = {https://doi.org/10.1108/eb047254},
urldate = {2024-02-08},
abstract = {The World-Wide Web (W3) initiative is a practical project designed to bring a global information universe into existence using available technology. This article describes the aims, data model, and protocols needed to implement the ``web'' and compares them with various contemporary systems.},
file = {/home/charlotte/sync/Zotero/storage/D4DFLNVS/[email protected];/home/charlotte/sync/Zotero/storage/6X7DIDMX/html.html}
}
@article{berniusMachineLearningBased2022,
title = {Machine Learning Based Feedback on Textual Student Answers in Large Courses},
author = {Bernius, Jan Philip and Krusche, Stephan and Bruegge, Bernd},
year = {2022},
month = jan,
journal = {{Computers and Education: Artificial Intelligence}},
volume = {3},
pages = {100081},
issn = {2666-920X},
doi = {10.1016/j.caeai.2022.100081},
url = {https://www.sciencedirect.com/science/article/pii/S2666920X22000364},
urldate = {2024-01-10},
abstract = {Many engineering disciplines require problem-solving skills, which cannot be learned by memorization alone. Open-ended textual exercises allow students to acquire these skills. Students can learn from their mistakes when instructors provide individual feedback. However, grading these exercises is often a manual, repetitive, and time-consuming activity. The number of computer science students graduating per year has steadily increased over the last decade. This rise has led to large courses that cause a heavy workload for instructors, especially if they provide individual feedback to students. This article presents CoFee, a framework to generate and suggest computer-aided feedback for textual exercises based on machine learning. CoFee utilizes a segment-based grading concept, which links feedback to text segments. CoFee automates grading based on topic modeling and an assessment knowledge repository acquired during previous assessments. A language model builds an intermediate representation of the text segments. Hierarchical clustering identifies groups of similar text segments to reduce the grading overhead. We first demonstrated the CoFee framework in a small laboratory experiment in 2019, which showed that the grading overhead could be reduced by 85\%. This experiment confirmed the feasibility of automating the grading process for problem-solving exercises. We then evaluated CoFee in a large course at the Technical University of Munich from 2019 to 2021, with up to 2, 200 enrolled students per course. We collected data from 34 exercises offered in each of these courses. On average, CoFee suggested feedback for 45\% of the submissions. 92\% (Positive Predictive Value) of these suggestions were precise and, therefore, accepted by the instructors.},
keywords = {Assessment support system,Automatic assessment,Education,Feedback,Grading,Interactive learning,Learning,Software engineering},
file = {/home/charlotte/sync/Zotero/storage/UWSG2P4L/Bernius et al. - 2022 - Machine learning based feedback on textual student.pdf;/home/charlotte/sync/Zotero/storage/TLLKP87F/S2666920X22000364.html}
}
@article{berryGraderPrograms1966,
title = {Grader {{Programs}}},
author = {Berry, R. E.},
year = {1966},
month = nov,
journal = {{The Computer Journal}},
volume = {9},
number = {3},
pages = {252--256},
issn = {0010-4620},
doi = {10.1093/comjnl/9.3.252},
url = {https://doi.org/10.1093/comjnl/9.3.252},
urldate = {2024-02-07},
abstract = {This paper examines the possibility of using automatic grading programs for checking some of the practical work of students on a Numerical Analysis course. Two existing programs for checking root-finding techniques were tested to gain experience in using grader programs. A program to check solutions to a system of n first order differential equations was written.},
file = {/home/charlotte/sync/Zotero/storage/M66WNCES/berry1966.pdf.pdf;/home/charlotte/sync/Zotero/storage/WEVW8H9W/Berry - 1966 - Grader Programs.pdf;/home/charlotte/sync/Zotero/storage/34CCGYRS/406256.html}
}
@inproceedings{bethkeryExploringExploratoryProgramming2017,
title = {Exploring Exploratory Programming},
booktitle = {2017 {{IEEE Symposium}} on {{Visual Languages}} and {{Human-Centric Computing}} ({{VL}}/{{HCC}})},
author = {Beth Kery, Mary and Myers, Brad A.},
year = {2017},
month = oct,
pages = {25--29},
issn = {1943-6106},
doi = {10.1109/VLHCC.2017.8103446},
abstract = {In open-ended tasks where a program's behavior cannot be specified in advance, exploratory programming is a key practice in which programmers actively experiment with different possibilities using code. Exploratory programming is highly relevant today to a variety of professional and end-user programmer domains, including prototyping, learning through play, digital art, and data science. However, prior research has largely lacked clarity on what exploratory programming is, and what behaviors are characteristic of this practice. Drawing on this data and prior literature, we provide an organized description of what exploratory programming has meant historically and a framework of four dimensions for studying exploratory programming tasks: (1) applications, (2) required code quality, (3) ease or difficulty of exploration, and (4) the exploratory process. This provides a basis for better analyzing tool support for exploratory programming.},
keywords = {Creativity Support,Debugging,End-user programming,Exploratory Programming,Games,Programming profession,Tools,Visualization},
file = {/home/charlotte/sync/Zotero/storage/PPD78QCN/Beth Kery and Myers - 2017 - Exploring exploratory programming.pdf;/home/charlotte/sync/Zotero/storage/8TD2CSXN/8103446.html}
}
@inproceedings{billsSharingIntroductoryProgramming2007,
title = {Sharing Introductory Programming Curriculum across Disciplines},
booktitle = {Proceedings of the 8th {{ACM SIGITE}} Conference on {{Information}} Technology Education},
author = {Bills, Dianne P. and Canosa, Roxanne L.},
year = {2007},
month = oct,
series = {{{SIGITE}} '07},
pages = {99--106},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/1324302.1324324},
url = {https://dl.acm.org/doi/10.1145/1324302.1324324},
urldate = {2024-01-10},
abstract = {Originally there was one computing curriculum, computer science, which provided a "one-size-fits-all" education in programming and computing in general. Today, computing education has diverged into an array of sub-discipline areas as educators try to meet the changing computing needs of business and industry. Information technology, software engineering, computer engineering, and information systems have emerged from computer science as distinct computing disciplines. Plus, additional "micro-disciplines" are quickly emerging: games and networking from information technology, for example. The foundation skill for all computing disciplines is programming. However as computing technologies advance, discipline-specific differences increase. Each computing sub-discipline needs to approach programming from a slightly different viewpoint to meet student expectations of being highly marketable and employer expectations of quick productivity. How can colleges and universities economically meet the competing demands for a focused computing education while maintaining a strong foundation in programming fundamentals. This paper discusses how an introductory programming sequence can be designed with a common base to support multiple computing sub-disciplines as well as differentiated to address the specific, focused needs of a given sub-discipline. We identify both commonalities that support economy of scale and important differences that distinguish sub-discipline curricula.},
isbn = {978-1-59593-920-3},
keywords = {computer programming,curriculum,curriculum comparison,information technology education,sharing curriculum},
file = {/home/charlotte/sync/Zotero/storage/99SBRYF9/Bills and Canosa - 2007 - Sharing introductory programming curriculum across.pdf;/home/charlotte/sync/Zotero/storage/ECNMV5H7/bills2007.pdf.pdf}
}
@inproceedings{binnsItReducingHuman2018,
title = {'{{It}}'s {{Reducing}} a {{Human Being}} to a {{Percentage}}': {{Perceptions}} of {{Justice}} in {{Algorithmic Decisions}}},
shorttitle = {'{{It}}'s {{Reducing}} a {{Human Being}} to a {{Percentage}}'},
booktitle = {Proceedings of the 2018 {{CHI Conference}} on {{Human Factors}} in {{Computing Systems}}},
author = {Binns, Reuben and Van Kleek, Max and Veale, Michael and Lyngs, Ulrik and Zhao, Jun and Shadbolt, Nigel},
year = {2018},
month = apr,
series = {{{CHI}} '18},
pages = {1--14},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3173574.3173951},
url = {https://doi.org/10.1145/3173574.3173951},
urldate = {2021-04-30},
abstract = {Data-driven decision-making consequential to individuals raises important questions of accountability and justice. Indeed, European law provides individuals limited rights to 'meaningful information about the logic' behind significant, autonomous decisions such as loan approvals, insurance quotes, and CV filtering. We undertake three experimental studies examining people's perceptions of justice in algorithmic decision-making under different scenarios and explanation styles. Dimensions of justice previously observed in response to human decision-making appear similarly engaged in response to algorithmic decisions. Qualitative analysis identified several concerns and heuristics involved in justice perceptions including arbitrariness, generalisation, and (in)dignity. Quantitative analysis indicates that explanation styles primarily matter to justice perceptions only when subjects are exposed to multiple different styles---under repeated exposure of one style, scenario effects obscure any explanation effects. Our results suggests there may be no 'best' approach to explaining algorithmic decisions, and that reflection on their automated nature both implicates and mitigates justice dimensions.},
isbn = {978-1-4503-5620-6},
keywords = {algorithmic decision-making,explanation,fairness,justice,machine learning,transparency},
file = {/home/charlotte/sync/Zotero/storage/IKJY2PR9/Binns et al. - 2018 - 'It's Reducing a Human Being to a Percentage' Per.pdf}
}
@inproceedings{bishopFlippedClassroomSurvey2013,
title = {The {{Flipped Classroom}}: {{A Survey}} of the {{Research}}},
shorttitle = {The {{Flipped Classroom}}},
booktitle = {2013 {{ASEE Annual Conference}} \& {{Exposition}}},
author = {Bishop, Jacob and Verleger, Matthew A.},
year = {2013},
month = jun,
pages = {23.1200.1-23.1200.18},
issn = {2153-5965},
url = {https://peer.asee.org/the-flipped-classroom-a-survey-of-the-research},
urldate = {2022-08-16},
file = {/home/charlotte/sync/Zotero/storage/NK937ZL5/Bishop and Verleger - 2013 - The Flipped Classroom A Survey of the Research.pdf;/home/charlotte/sync/Zotero/storage/849MXNUK/the-flipped-classroom-a-survey-of-the-research.html}
}
@article{blackAssessmentClassroomLearning1998,
title = {Assessment and {{Classroom Learning}}},
author = {Black, Paul and Wiliam, Dylan},
year = {1998},
month = mar,
journal = {{Assessment in Education: Principles, Policy \& Practice}},
volume = {5},
number = {1},
pages = {7--74},
publisher = {Routledge},
issn = {0969-594X},
doi = {10.1080/0969595980050102},
url = {https://doi.org/10.1080/0969595980050102},
urldate = {2021-08-10},
abstract = {This article is a review of the literature on classroom formative assessment. Several studies show firm evidence that innovations designed to strengthen the frequent feedback that students receive about their learning yield substantial learning gains. The perceptions of students and their role in self-assessment are considered alongside analysis of the strategies used by teachers and the formative strategies incorporated in such systemic approaches as mastery learning. There follows a more detailed and theoretical analysis of the nature of feedback, which provides a basis for a discussion of the development of theoretical models for formative assessment and of the prospects for the improvement of practice.}
}
@article{bliksteinProgrammingPluralismUsing2014,
title = {Programming {{Pluralism}}: {{Using Learning Analytics}} to {{Detect Patterns}} in the {{Learning}} of {{Computer Programming}}},
shorttitle = {Programming {{Pluralism}}},
author = {Blikstein, Paulo and Worsley, Marcelo and Piech, Chris and Sahami, Mehran and Cooper, Steven and Koller, Daphne},
year = {2014},
month = oct,
journal = {{Journal of the Learning Sciences}},
volume = {23},
number = {4},
pages = {561--599},
publisher = {Routledge},
issn = {1050-8406},
doi = {10.1080/10508406.2014.954750},
url = {https://doi.org/10.1080/10508406.2014.954750},
urldate = {2023-10-18},
abstract = {New high-frequency, automated data collection and analysis algorithms could offer new insights into complex learning processes, especially for tasks in which students have opportunities to generate unique open-ended artifacts such as computer programs. These approaches should be particularly useful because the need for scalable project-based and student-centered learning is growing considerably. In this article, we present studies focused on how students learn computer programming, based on data drawn from 154,000 code snapshots of computer programs under development by approximately 370 students enrolled in an introductory undergraduate programming course. We use methods from machine learning to discover patterns in the data and try to predict final exam grades. We begin with a set of exploratory experiments that use fully automated techniques to investigate how much students change their programming behavior throughout all assignments in the course. The results show that students' change in programming patterns is only weakly predictive of course performance. We subsequently hone in on 1 single assignment, trying to map students' learning process and trajectories and automatically identify productive and unproductive (sink) states within these trajectories. Results show that our process-based metric has better predictive power for final exams than the midterm grades. We conclude with recommendations about the use of such methods for assessment, real-time feedback, and course improvement.},
file = {/home/charlotte/sync/Zotero/storage/XVUQVM6A/Blikstein et al. - 2014 - Programming Pluralism Using Learning Analytics to.pdf}
}
@article{bloom1956handbook,
title = {Handbook {{I}}: Cognitive Domain},
author = {Bloom, Benjamin S and Engelhart, Max D and Furst, {\relax EJ} and Hill, Walker H and Krathwohl, David R},
year = {1956},
journal = {{New York: David McKay}},
file = {/home/charlotte/sync/Zotero/storage/32VDQ3EH/Bloom et al. - 1956 - Handbook I cognitive domain.pdf}
}
@article{boctorActivelearningStrategiesUse2013,
title = {Active-Learning Strategies: {{The}} Use of a Game to Reinforce Learning in Nursing Education. {{A}} Case Study},
shorttitle = {Active-Learning Strategies},
author = {Boctor, Lisa},
year = {2013},
month = mar,
journal = {{Nurse Education in Practice}},
volume = {13},
number = {2},
pages = {96--100},
issn = {1471-5953},
doi = {10.1016/j.nepr.2012.07.010},
url = {https://www.sciencedirect.com/science/article/pii/S1471595312001424},
urldate = {2021-09-30},
abstract = {The majority of nursing students are kinesthetic learners, preferring a hands-on, active approach to education. Research shows that active-learning strategies can increase student learning and satisfaction. This study looks at the use of one active-learning strategy, a Jeopardy-style game, `Nursopardy', to reinforce Fundamentals of Nursing material, aiding in students' preparation for a standardized final exam. The game was created keeping students varied learning styles and the NCLEX blueprint in mind. The blueprint was used to create 5 categories, with 26 total questions. Student survey results, using a five-point Likert scale showed that they did find this learning method enjoyable and beneficial to learning. More research is recommended regarding learning outcomes, when using active-learning strategies, such as games.},
langid = {english},
keywords = {Active learning,Games,Nursing education},
file = {/home/charlotte/sync/Zotero/storage/YYYN8LQ6/Boctor - 2013 - Active-learning strategies The use of a game to r.pdf}
}
@article{boelensConjectureMappingSupport2020,
title = {Conjecture Mapping to Support Vocationally Educated Adult Learners in Open-Ended Tasks},
author = {Boelens, Ruth and De Wever, Bram and McKenney, Susan},
year = {2020},
month = may,
journal = {{Journal of the Learning Sciences}},
volume = {29},
number = {3},
pages = {430--470},
publisher = {Routledge},
issn = {1050-8406},
doi = {10.1080/10508406.2020.1759605},
url = {https://doi.org/10.1080/10508406.2020.1759605},
urldate = {2021-09-15},
abstract = {Background This case reports on a teacher education course that aimed to support adult learners with a vocational education background to accomplish open-ended tasks. Conjecture mapping was used to identify the most salient design features, and to test if, how, and why these course features supported learners. Methods: Inspired by ethnographic approaches, sustained engagement and multiple data sources were used to explain the effects of the course design on participants' behavior and perceptions: student and teacher interviews, observations, and artifacts. Findings: The results reveal that almost all of the proposed design features stimulated the participants toward the intended enactment processes, which in turn yielded the intended learning outcomes. For instance, worked examples (i.e., design feature) not only engendered the production of artifacts that meet high standards (i.e., enactment process) because they clarify the task requirements, but also fostered a safe structure (i.e., enactment process) by providing an overall picture of the task. Contribution: The conjecture map resulting from this study provides a theoretical frame to describe, explain, and predict how specific course design features support vocationally educated adult learners (VEAL) in open-ended tasks, and assists those who aim to implement open-ended tasks in similar contexts.},
file = {/home/charlotte/sync/Zotero/storage/QQ3Z4SAU/Boelens et al. - 2020 - Conjecture mapping to support vocationally educate.pdf;/home/charlotte/sync/Zotero/storage/TSZVRFQN/10508406.2020.html}
}
@techreport{bonarBridgeIntelligentTutoring1988,
title = {Bridge: {{Intelligent}} Tutoring with Intermediate Representations},
author = {Bonar, Jeffrey G and Cunningham, Robert},
year = {1988},
month = may,
institution = {{University of Pittsburgh, Artificial Intelligence and Psychology}}
}
@article{borteBarriersStudentActive2020,
title = {Barriers to Student Active Learning in Higher Education},
author = {B{\o}rte, Kristin and Nesje, Katrine and Lillejord, S{\o}lvi},
year = {2020},
month = nov,
journal = {{Teaching in Higher Education}},
volume = {0},
number = {0},
pages = {1--19},
publisher = {Routledge},
issn = {1356-2517},
doi = {10.1080/13562517.2020.1839746},
url = {https://doi.org/10.1080/13562517.2020.1839746},
urldate = {2022-03-03},
abstract = {This article reviews research that consistently, across borders and over time, reveals inertia in Higher Education institutions related to innovation in academic teaching. Despite frequent calls for more student-active learning, studies find that teaching remains predominantly traditional and teacher-centred. While research is recognised as continuously developing, border-crossing, investigative and innovative collaborative activities that needs an infrastructure to succeed, the need for collaborative development and a supporting infrastructure is rarely mentioned in academic teaching, often described as individual and traditional in the research. To better understand this paradox, and to identify barriers to student active learning, we reanalysed articles from two systematic reviews, one on campus development and one on learning and teaching with technology. The article identified the following prerequisites for student active learning to succeed: (1) better alignment between research and teaching practices, (2) a supporting infrastructure for research and teaching, (3) staff professional development and learning designs.},
keywords = {barriers,infrastructure,literature review,scholarly approach,Student active learning},
file = {/home/charlotte/sync/Zotero/storage/LNLEXLHZ/Børte et al. - 2020 - Barriers to student active learning in higher educ.pdf;/home/charlotte/sync/Zotero/storage/ZHKF2YD4/13562517.2020.html}
}
@book{braden1965introductory,
title = {An Introductory Course in Computer Programming},
author = {Braden, Robert T and Perlis, Alan J},
year = {1965},
publisher = {{Clearinghouse for Federal Scientific and Technical Information, US {\dots}}}
}
@inproceedings{brievenPracticingAbstractionSkills2024,
title = {{Practicing Abstraction Skills Through Diagrammatic Reasoning Over CAF{\'E} 2.0}},
booktitle = {{IEEE Global Engineering Education Conference (EDUCON)}},
author = {Brieven, G{\'e}raldine and Malcev, Lev and Donnet, Beno{\^i}t},
year = {2024},
month = may,
publisher = {IEEE},
url = {https://orbi.uliege.be/handle/2268/313506},
urldate = {2024-02-26},
abstract = {Shaping first-year students' minds to solve problems at different levels of abstraction is both important and challenging. Although abstraction is a crucial skill in problem-solving, especially in STEM subjects, students often struggle with abstract thinking. They tend to focus their efforts on concrete aspects of the problem, where they feel more comfortable and closer to the final solution. Unfortunately, this approach can cause them to overlook critical details related to the problem or its solution. To address this issue in our Introduction to Programming (CS1) course, we introduced a programming methodology that requires students to create a graphical representation of their solution and then derive the code from it. To enable them to practice this diagrammatic reasoning approach on a regular basis, we developed a learning tool called CAF{\'E} 2.0. It facilitates a semester-long activity in which students solve problems by submitting both a graphical representation of their solution and its implementation. Further to checking the final implementation, CAF{\'E} 2.0 also provides personalized {\textbackslash}fb on how students have graphically modeled their solution and how consistent it is with their code. This paper presents an overview of the features of CAF{\'E} 2.0 and the methodology it currently supports in the context of our CS1 course. Then, using a survey and learning analytics, this paper evaluates students' interactions with CAF{\'E} 2.0. Finally, the potential for extending CAF{\'E} 2.0 to other STEM disciplines is discussed.},
langid = {Anglais},
file = {/home/charlotte/sync/Zotero/storage/G5CZJLVH/Brieven et al. - 2024 - Practicing Abstraction Skills Through Diagrammatic.pdf}
}
@book{brooksNoSilverBullet1987,
title = {No Silver Bullet},
author = {Brooks, Frederick and Kugler, H},
year = {1987},
publisher = {April}
}
@misc{brunsfeldTreesitterTreesitterV02024,
title = {Tree-Sitter/Tree-Sitter: V0.20.9},
shorttitle = {Tree-Sitter/Tree-Sitter},
author = {Brunsfeld, Max and Hlynskyi, Andrew and Qureshi, Amaan and Thomson, Amaan and Josh Vera and Phil Turnbull and Timothy Clem and Douglas Creager and Andrew Helwer and Rob Rix and {Hendrik van Antwerpen} and Daumantas Kavolis and Michael Davis and Ika and {Tuấn-Anh Nguyễn} and Matt Massicotte and Stafford Brunk and Amin Yahyaabadi and Niranjan Hasabnis and {bfredl} and Mingkai Dong and Samuel Moelius and Jonathan Arnett and Vladimir Panteleev and Kolja and Steven Kalt and Linda\_pp and George Fraser and Edgar},
year = {2024},
month = jan,
doi = {10.5281/ZENODO.4619183},
url = {https://zenodo.org/doi/10.5281/zenodo.4619183},
urldate = {2024-02-05},
abstract = {An incremental parsing system for programming tools},
copyright = {Creative Commons Attribution 4.0 International},
howpublished = {Zenodo}
}
@article{brusilovskyIndividualizedExercisesSelfassessment2005,
title = {Individualized Exercises for Self-Assessment of Programming Knowledge: {{An}} Evaluation of {{QuizPACK}}},
shorttitle = {Individualized Exercises for Self-Assessment of Programming Knowledge},
author = {Brusilovsky, Peter and Sosnovsky, Sergey},
year = {2005},
month = sep,
journal = {{Journal on Educational Resources in Computing}},
volume = {5},
number = {3},
pages = {6--es},
issn = {1531-4278},
doi = {10.1145/1163405.1163411},
url = {https://dl.acm.org/doi/10.1145/1163405.1163411},
urldate = {2024-02-09},
abstract = {Individualized exercises are a promising feature in promoting modern e-learning. The focus of this article is on the QuizPACK system, which is able to generate parameterized exercises for the C language and automatically evaluate the correctness of student answers. We introduce QuizPACK and present the results of its comprehensive classroom evaluation during four consecutive semesters. Our studies demonstrate that when QuizPACK is used for out-of-class self-assessment, it is an exceptional learning tool. The students' work with QuizPACK significantly improved their knowledge of semantics and positively affected higher-level knowledge and skills. The students themselves praised the system highly as a learning tool. We also demonstrated that the use of the system in self-assessment mode can be significantly increased by basing later classroom paper-and-pencil quizzes on QuizPACK questions, motivating students to practice them more.},
keywords = {assessment,classroom study,code execution,E-learning,individualized exercises,introductory programming,parameterized questions},
file = {/home/charlotte/sync/Zotero/storage/CRSCG93F/Brusilovsky and Sosnovsky - 2005 - Individualized exercises for self-assessment of pr.pdf;/home/charlotte/sync/Zotero/storage/UAJJT4E4/brusilovsky2005.pdf.pdf}
}
@inproceedings{caizaProgrammingAssignmentsAutomatic2013,
title = {Programming Assignments Automatic Grading: Review of Tools and Implementations},
shorttitle = {Programming Assignments Automatic Grading},
booktitle = {7th {{International Technology}}, {{Education}} and {{Development Conference}} ({{INTED2013}}) {\textbar} 7th {{International Technology}}, {{Education}} and {{Development Conference}} ({{INTED2013}}) {\textbar} 04/03/2013 - 06/03/2013 {\textbar} {{Valencia}}, {{Spain}}},
author = {Caiza, Julio C. and del {\'A}lamo Ramiro, Jos{\'e} Mar{\'i}a},
year = {2013},
pages = {5691--5700},
publisher = {E.T.S.I. Telecomunicaci{\'o}n (UPM)},
address = {Valencia, Spain},
url = {https://oa.upm.es/25765/},
urldate = {2022-08-16},
abstract = {Automatic grading of programming assignments is an important topic in academic research. It aims at improving the level of feedback given to students and optimizing the professor time. Several researches have reported the development of software tools to support this process. Then, it is helpfulto get a quickly and good sight about their key features. This paper reviews an ample set of tools forautomatic grading of programming assignments. They are divided in those most important mature tools, which have remarkable features; and those built recently, with new features. The review includes the definition and description of key features e.g. supported languages, used technology, infrastructure, etc. The two kinds of tools allow making a temporal comparative analysis. This analysis infrastructure, etc. The two kinds of tools allow making a temporal comparative analysis. This analysis shows good improvements in this research field, these include security, more language support, plagiarism detection, etc. On the other hand, the lack of a grading model for assignments is identified as an important gap in the reviewed tools. Thus, a characterization of evaluation metrics to grade programming assignments is provided as first step to get a model. Finally new paths in this research field are proposed.},
copyright = {https://creativecommons.org/licenses/by-nc-nd/3.0/es/},
langid = {english},
file = {/home/charlotte/sync/Zotero/storage/T6US678G/Caiza and Álamo Ramiro - 2013 - Programming assignments automatic grading review .pdf;/home/charlotte/sync/Zotero/storage/8FBZPPGA/25765.html}
}
@inproceedings{cambroneroWhenDeepLearning2019,
title = {When Deep Learning Met Code Search},
booktitle = {Proceedings of the 2019 27th {{ACM Joint Meeting}} on {{European Software Engineering Conference}} and {{Symposium}} on the {{Foundations}} of {{Software Engineering}}},
author = {Cambronero, Jose and Li, Hongyu and Kim, Seohyun and Sen, Koushik and Chandra, Satish},
year = {2019},
month = aug,
series = {{{ESEC}}/{{FSE}} 2019},
pages = {964--974},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3338906.3340458},
url = {https://dl.acm.org/doi/10.1145/3338906.3340458},
urldate = {2023-11-23},
abstract = {There have been multiple recent proposals on using deep neural networks for code search using natural language. Common across these proposals is the idea of embedding code and natural language queries into real vectors and then using vector distance to approximate semantic correlation between code and the query. Multiple approaches exist for learning these embeddings, including unsupervised techniques, which rely only on a corpus of code examples, and supervised techniques, which use an aligned corpus of paired code and natural language descriptions. The goal of this supervision is to produce embeddings that are more similar for a query and the corresponding desired code snippet. Clearly, there are choices in whether to use supervised techniques at all, and if one does, what sort of network and training to use for supervision. This paper is the first to evaluate these choices systematically. To this end, we assembled implementations of state-of-the-art techniques to run on a common platform, training and evaluation corpora. To explore the design space in network complexity, we also introduced a new design point that is a minimal supervision extension to an existing unsupervised technique. Our evaluation shows that: 1. adding supervision to an existing unsupervised technique can improve performance, though not necessarily by much; 2. simple networks for supervision can be more effective that more sophisticated sequence-based networks for code search; 3. while it is common to use docstrings to carry out supervision, there is a sizeable gap between the effectiveness of docstrings and a more query-appropriate supervision corpus.},
isbn = {978-1-4503-5572-8},
keywords = {code search,joint embedding,neural networks},
file = {/home/charlotte/sync/Zotero/storage/EENERC5Z/Cambronero et al. - 2019 - When deep learning met code search.pdf}
}
@article{caswellOpenEducationalResources2008,
title = {Open {{Educational Resources}}: {{Enabling}} Universal Education},
shorttitle = {Open {{Educational Resources}}},
author = {Caswell, Tom and Henson, Shelley and Jensen, Marion and Wiley, David},
year = {2008},
journal = {{International Review of Research in Open and Distributed Learning}},
volume = {9},
number = {1},
pages = {1--11},
publisher = {Athabasca University Press (AU Press)},
issn = {1492-3831},
doi = {10.19173/irrodl.v9i1.469},
url = {https://www.erudit.org/en/journals/irrodl/2008-v9-n1-irrodl05535/1071813ar/},
urldate = {2022-10-03},
abstract = {The role of distance education is shifting. Traditionally distance education was limited in the number of people served because of production, reproduction, and distribution costs. Today, while it still costs the university time and money to produce a course, technology has made it such that reproduction costs are almost non-existent. This shift has significant implications, and allows distance educators to play an important role in the fulfillment of the promise of the right to universal education. At little or no cost, universities can make their content available to millions. This content has the potential to substantially improve the quality of life of learners around the world. New distance education technologies, such as OpenCourseWares, act as enablers to achieving the universal right to education. These technologies, and the associated changes in the cost of providing access to education, change distance education's role from one of classroom alternative to one of social transformer.},
langid = {english},
keywords = {access,distance education,new technologies,OpenCourseWare},
file = {/home/charlotte/sync/Zotero/storage/A2G72CME/Caswell et al. - 2008 - Open Educational Resources Enabling universal edu.pdf;/home/charlotte/sync/Zotero/storage/SNVPCNAG/abstract.html}
}
@article{cavalcantiExplainablePredictionFeedback2023,
title = {Towards {{Explainable Prediction Feedback Messages Using BERT}}},
author = {Cavalcanti, Anderson Pinheiro and Mello, Rafael Ferreira and Ga{\v s}evi{\'c}, Dragan and Freitas, Fred},
year = {2023},
month = nov,
journal = {{International Journal of Artificial Intelligence in Education}},
issn = {1560-4306},
doi = {10.1007/s40593-023-00375-w},
url = {https://doi.org/10.1007/s40593-023-00375-w},
urldate = {2024-01-10},
abstract = {Educational feedback is a crucial factor in the student's learning journey, as through it, students are able to identify their areas of deficiencies and improve self-regulation. However, the literature shows that this is an area of great dissatisfaction, especially in higher education. Providing effective feedback becomes an increasingly challenging task as the number of students increases. Therefore, this article explores the use of automated content analysis to examine instructor feedback based on reputable models from the literature that provide best practices and classify feedback at different levels. For this, this article proposes using the transformer model BERT to classify feedback messages. The proposed method outperforms previous works by up to 35.71\% in terms of Cohen's kappa. Finally, this study adopted an explainable artificial intelligence to provide insights into the most predictive features for each classifier analyzed.},
langid = {english},
keywords = {BERT,Explainable artificial intelligence,Feedback,Online learning},
file = {/home/charlotte/sync/Zotero/storage/6DLW2ES2/Cavalcanti et al. - 2023 - Towards Explainable Prediction Feedback Messages U.pdf}
}
@article{cervoneMathJaxPlatformMathematics2012,
title = {{{MathJax}}: A Platform for Mathematics on the {{Web}}},
author = {Cervone, Davide},
year = {2012},
journal = {{Notices of the AMS}},
volume = {59},
number = {2},
pages = {312--316}
}
@article{chattiReferenceModelLearning2012,
title = {A Reference Model for Learning Analytics},
author = {Chatti, Mohamed Amine and Dyckhoff, Anna Lea and Schroeder, Ulrik and Th{\"u}s, Hendrik},
year = {2012},
month = jan,
journal = {{International Journal of Technology Enhanced Learning}},
volume = {4},
number = {5-6},
pages = {318--331},
publisher = {Inderscience Publishers},
issn = {1753-5255},
doi = {10.1504/IJTEL.2012.051815},
url = {https://www.inderscienceonline.com/doi/10.1504/IJTEL.2012.051815},
urldate = {2024-02-13},
abstract = {Recently, there is an increasing interest in learning analytics in Technology-Enhanced Learning (TEL). Generally, learning analytics deals with the development of methods that harness educational datasets to support the learning process. Learning analytics (LA) is a multi-disciplinary field involving machine learning, artificial intelligence, information retrieval, statistics and visualisation. LA is also a field in which several related areas of research in TEL converge. These include academic analytics, action analytics and educational data mining. In this paper, we investigate the connections between LA and these related fields. We describe a reference model for LA based on four dimensions, namely data and environments (what?), stakeholders (who?), objectives (why?) and methods (how?). We then review recent publications on LA and its related fields and map them to the four dimensions of the reference model. Furthermore, we identify various challenges and research opportunities in the area of LA in relation to each dimension.},
keywords = {academic analytics,action research,educational data mining,learning analytics,literature review,reference model},
file = {/home/charlotte/sync/Zotero/storage/3GV8IWBM/chatti2012.pdf.pdf}
}
@article{cheangAutomatedGradingProgramming2003,
title = {On Automated Grading of Programming Assignments in an Academic Institution},
author = {Cheang, Brenda and Kurnia, Andy and Lim, Andrew and Oon, Wee-Chong},
year = {2003},
month = sep,
journal = {{Computers \& Education}},
volume = {41},
number = {2},
pages = {121--131},
issn = {0360-1315},
doi = {10.1016/S0360-1315(03)00030-7},
url = {https://www.sciencedirect.com/science/article/pii/S0360131503000307},
urldate = {2021-10-01},
abstract = {Practise is one of the most important steps in learning the art of computer programming. Unfortunately, human grading of programming assignments is a tedious and error-prone task, a problem compounded by the large enrolments of many programming courses. As a result, students in such courses tend to be given fewer programming assignments than should be ideally given. One solution to this problem is to automate the grading process such that students can electronically submit their programming assignments and receive instant feedback. This paper studies the implementation of one such automated grading system, called the Online Judge, in the School of Computing of the National University of Singapore for a compulsory first-year course that teaches basic programming techniques with over 700 students, describing the student reactions and behavior as well as the difficulties encountered. The Online Judge was also successfully employed for an advanced undergraduate course and an introductory high school course.},
langid = {english},
keywords = {Automated grading,Computer science,Education,Online judge},
file = {/home/charlotte/sync/Zotero/storage/AECADBN3/Cheang et al. - 2003 - On automated grading of programming assignments in.pdf;/home/charlotte/sync/Zotero/storage/KNUI69NI/S0360131503000307.html}
}
@article{chenAnalysisLearningBehavior2020,
title = {Analysis of {{Learning Behavior}} in an {{Automated Programming Assessment Environment}}: {{A Code Quality Perspective}}},
shorttitle = {Analysis of {{Learning Behavior}} in an {{Automated Programming Assessment Environment}}},
author = {Chen, Hsi-Min and Nguyen, Bao-An and Yan, Yi-Xiang and Dow, Chyi-Ren},
year = {2020},
journal = {{IEEE Access}},
volume = {8},
pages = {167341--167354},
issn = {2169-3536},
doi = {10.1109/ACCESS.2020.3024102},
url = {https://ieeexplore.ieee.org/document/9195825},
urldate = {2023-10-18},
abstract = {Automated programming assessment systems are useful tools to track the learning progress of students automatically and thereby reduce the workload of educators. They can also be used to gain insights into how students learn, making it easier to formulate strategies aimed at enhancing learning performance. Rather than functional code which is always inspected, code quality remains an essential aspect to which not many educators consider when designing an automated programming assessment system. In this study, we applied data mining techniques to analyze the results of an automated assessment system to reveal unexpressed patterns in code quality improvement that are predictive of final achievements in the course. Cluster analysis is first utilized to categorize students according to their learning behavior and outcomes. Cluster profile analysis is then leveraged to highlight actionable factors that could affect their final grades. Finally, the same factors are employed to construct a classification model by which to make early predictions of the students' final results. Our empirical results demonstrate the efficacy of the proposed scheme in providing valuable insights into the learning behaviors of students in novice programming courses, especially in code quality assurance, which could be used to enhance programming performance at the university level.},
file = {/home/charlotte/sync/Zotero/storage/C8KXJ7TR/Chen et al. - 2020 - Analysis of Learning Behavior in an Automated Prog.pdf;/home/charlotte/sync/Zotero/storage/V3F96LAQ/9195825.html}
}
@article{chickeringSevenPrinciplesGood1987,
title = {Seven {{Principles}} for {{Good Practice}} in {{Undergraduate Education}}},
author = {Chickering, Arthur W. and Gamson, Zelda F.},
year = {1987},
month = mar,
journal = {{AAHE Bulletin}},
url = {https://eric.ed.gov/?id=ed282491},
urldate = {2022-09-09},
abstract = {Seven principles that can help to improve undergraduate education are identified. Based on research on college teaching and learning, good practice in undergraduate education: (1) encourages contacts between students and faculty; (2) develops reciprocity and cooperation among students; (3) uses active learning techniques; (4) gives prompt feedback; (5) emphasizes time on task; (6) communicates high expectations; and (7) respects diverse talents and ways of learning. Examples of approaches that have been used in different kinds of college in the last few years are described. In addition, the implications of these principles for the way states fund and govern higher education and for the way institutions are run are briefly discussed. Examples of good approaches include: freshman seminars on important topics taught by senior faculty; learning groups of five to seven students who meet regularly during class to solve problems set by the instructor; active learning using structured exercises, discussions, team projects, and peer critiques, as well as internships and independent study; and mastery learning, contract learning, and computer-assisted instruction approaches, which required adequate time on learning. (SW)},
langid = {english},
keywords = {College Instruction,Educational Principles,Expectation,Feedback,Higher Education,Instructional Improvement,Learning Activities,Peer Relationship,Student Participation,Teacher Student Relationship,Time on Task,Undergraduate Study},
file = {/home/charlotte/sync/Zotero/storage/Y3IWLBAE/Chickering and Gamson - 1987 - Seven Principles for Good Practice in Undergraduat.pdf;/home/charlotte/sync/Zotero/storage/3MGELQSK/eric.ed.gov.html}
}
@inproceedings{chowAutomatedDataDrivenHints2017,
title = {Automated {{Data-Driven Hints}} for {{Computer Programming Students}}},
booktitle = {Adjunct {{Publication}} of the 25th {{Conference}} on {{User Modeling}}, {{Adaptation}} and {{Personalization}}},
author = {Chow, Sammi and Yacef, Kalina and Koprinska, Irena and Curran, James},
year = {2017},
month = jul,
series = {{{UMAP}} '17},
pages = {5--10},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3099023.3099065},
url = {https://doi.org/10.1145/3099023.3099065},
urldate = {2022-08-02},
abstract = {Formative feedback is essential for learning computer programming but is also a challenge to automate because of the many solutions a programming exercise can have. Whilst programming tutoring systems can easily generate automated feedback on how correct a program is, they less often provide some personalised guidance on how to improve or fix the code. In this paper, we present an approach for generating hints using previous student data. Utilising a range of techniques such as filtering, clustering and pattern mining, four different types of data-driven hints are generated: input suggestion, code-based, concept and pre-emptive hints. We evaluated our approach with data from 5529 students using the Grok Learning platform for teaching programming in Python. The results show that we can generate various types of hints for over 90\% of students with data from only 10 students, and hence, reduce the cold-start problem.},
isbn = {978-1-4503-5067-9},
keywords = {educational data mining,intelligent teaching systems,personalised feedback},
file = {/home/charlotte/sync/Zotero/storage/GKVBYZS4/Chow et al. - 2017 - Automated Data-Driven Hints for Computer Programmi.pdf}
}
@article{ciprianoDropProjectAutomatic2022,
title = {Drop {{Project}}: {{An}} Automatic Assessment Tool for Programming Assignments},
shorttitle = {Drop {{Project}}},
author = {Cipriano, Bruno Pereira and Fachada, Nuno and Alves, Pedro},
year = {2022},
month = jun,
journal = {{SoftwareX}},
volume = {18},
pages = {101079},
issn = {2352-7110},
doi = {10.1016/j.softx.2022.101079},
url = {https://www.sciencedirect.com/science/article/pii/S2352711022000577},
urldate = {2022-11-23},
abstract = {Automated assessment tools (AATs) are software systems used in teaching environments to automate the evaluation of computer programs implemented by students. These tools can be used to stimulate the interest of computer science students in programming courses by providing quick feedback on their work and highlighting their mistakes. Despite the abundance of such tools, most of them are developed for a specific course and are not production-ready. Others lack advanced features that are required for certain pedagogical goals (e.g. Git integration) and/or are not flexible enough to be used with students having different computer literacy levels, such as first year and second year students. In this paper we present Drop Project (DP), an automated assessment tool built on top of the Maven build automation software. We have been using DP in our teaching activity since 2018, having received more than fifty thousand submissions between projects, classroom exercises, tests and homework assignments. The tool's automated feedback has allowed us to raise the difficulty level of the course's projects, while the grading process has become more efficient and consistent between different teachers. DP is an extensively tested, production-ready tool. The software's code and documentation are available in GitHub under an open-source software license.},
langid = {english},
keywords = {Automated assessment,Computer science education,Programming education,Unit testing},
file = {/home/charlotte/sync/Zotero/storage/3M9RAMYG/Cipriano et al. - 2022 - Drop Project An automatic assessment tool for pro.pdf;/home/charlotte/sync/Zotero/storage/LJ3KZHVY/S2352711022000577.html}
}
@book{CodeCloneAnalysis,
title = {Code {{Clone Analysis}}},
url = {https://link.springer.com/book/10.1007/978-981-16-1927-4},
urldate = {2022-07-05},
abstract = {This book selects past research results that are important to the progress of code clone analysis and updates them with new results and future directions.},
langid = {english},
file = {/home/charlotte/sync/Zotero/storage/4V9XFUZX/Code Clone Analysis.pdf;/home/charlotte/sync/Zotero/storage/5UWWES36/978-981-16-1927-4.html}
}
@article{cooperFacilitatingLearningFormative2000,
title = {Facilitating {{Learning}} from {{Formative Feedback}} in {{Level}} 3 {{Assessment}}},
author = {Cooper, Neil J.},
year = {2000},
month = sep,
journal = {{Assessment \& Evaluation in Higher Education}},
volume = {25},
number = {3},
pages = {279--291},
publisher = {Routledge},
issn = {0260-2938},
doi = {10.1080/713611435},
url = {https://doi.org/10.1080/713611435},
urldate = {2022-08-16},
abstract = {This paper presents the development, through action research, of formative elements in assessment in a level 3 compulsory module of the BSc Health Studies and BSc Nursing programmes at the University of Sunderland. The paper reviews three cycles of planning, implementing and evaluating change in assessment strategy and is written in the first person to emphasise the connections between the writer and the material. From a consideration of the format and characteristics of the assessment within the module, the action research is reported through the implementation of actions taken to facilitate more effective use of formative feedback. The evaluation of these actions through my own reflections, student performance, dialogue with team colleagues and student feedback through the production of short narrative accounts of their learning experience is outlined. The paper demonstrates that through explicitly using the learning potential within assessment, learning can be facilitated through challenging students to move from 'doing' assignments, to reflexive thinking about their writing.}
}
@inproceedings{cortesSupportVectorNetworks1995,
title = {Support-{{Vector Networks}}},
booktitle = {Machine {{Learning}}},
author = {Cortes, Corinna and Vapnik, Vladimir},
year = {1995},
pages = {273--297},
abstract = {The support-vector network is a new learning machine for two-group classification problems. The machine conceptually implements the following idea: input vectors are non-linearly mapped to a very high-dimension feature space. In this feature space a linear decision surface is constructed. Special properties of the decision surface ensures high generalization ability of the learning machine. The idea behind the supportvector network was previously implemented for the restricted case where the training data can be separated without errors. We here extend this result to non-separable training data.},
file = {/home/charlotte/sync/Zotero/storage/UWV6AEE5/Cortes and Vapnik - 1995 - Support-Vector Networks.pdf;/home/charlotte/sync/Zotero/storage/K3GBYBQ7/summary.html}
}
@inproceedings{cortezUsingDataMining2008,
title = {Using Data Mining to Predict Secondary School Student Performance},
author = {Cortez, Paulo and Silva, Alice Maria Gon{\c c}alves},
year = {2008},
month = apr,
publisher = {EUROSIS-ETI},
url = {http://repositorium.sdum.uminho.pt/},
urldate = {2021-09-16},
abstract = {Although the educational level of the Portuguese population has improved in the last decades, the statistics keep Portugal at Europe's tail end due to its high student failure rates. In particular, lack of success in the core classes of Mathematics and the Portuguese language is extremely serious. On the other hand, the fields of Business Intelligence (BI)/Data Mining (DM), which aim at extracting high-level knowledge from raw data, offer interesting automated tools that can aid the education domain. The present work intends to approach student achievement in secondary education using BI/DM techniques. Recent real-world data (e.g. student grades, demographic, social and school related features) was collected by using school reports and questionnaires. The two core classes (i.e. Mathematics and Portuguese) were modeled under binary/five-level classification and regression tasks. Also, four DM models (i.e. Decision Trees, Random Forest, Neural Networks and Support Vector Machines) and three input selections (e.g. with and without previous grades) were tested. The results show that a good predictive accuracy can be achieved, provided that the first and/or second school period grades are available. Although student achievement is highly influenced by past evaluations, an explanatory analysis has shown that there are also other relevant features (e.g. number of absences, parent's job and education, alcohol consumption). As a direct outcome of this research, more efficient student prediction tools can be be developed, improving the quality of education and enhancing school resource management.},
copyright = {openAccess},
isbn = {978-90-77381-39-7},
langid = {english},
annotation = {Accepted: 2008-08-20T18:31:05Z},
file = {/home/charlotte/sync/Zotero/storage/PCJIYPJI/Cortez and Silva - 2008 - Using data mining to predict secondary school stud.pdf;/home/charlotte/sync/Zotero/storage/2RGMNRJS/8024.html}
}
@article{costaEvaluatingEffectivenessEducational2017,
title = {Evaluating the Effectiveness of Educational Data Mining Techniques for Early Prediction of Students' Academic Failure in Introductory Programming Courses},
author = {Costa, Evandro B. and Fonseca, Baldoino and Santana, Marcelo Almeida and {de Ara{\'u}jo}, Fabr{\'i}sia Ferreira and Rego, Joilson},
year = {2017},
month = aug,
journal = {{Computers in Human Behavior}},
volume = {73},
pages = {247--256},
issn = {0747-5632},
doi = {10.1016/j.chb.2017.01.047},
url = {https://www.sciencedirect.com/science/article/pii/S0747563217300596},
urldate = {2023-10-18},
abstract = {The data about high students' failure rates in introductory programming courses have been alarming many educators, raising a number of important questions regarding prediction aspects. In this paper, we present a comparative study on the effectiveness of educational data mining techniques to early predict students likely to fail in introductory programming courses. Although several works have analyzed these techniques to identify students' academic failures, our study differs from existing ones as follows: (i) we investigate the effectiveness of such techniques to identify students likely to fail at early enough stage for action to be taken to reduce the failure rate; (ii) we analyse the impact of data preprocessing and algorithms fine-tuning tasks, on the effectiveness of the mentioned techniques. In our study we evaluated the effectiveness of four prediction techniques on two different and independent data sources on introductory programming courses available from a Brazilian Public University: one comes from distance education and the other from on-campus. The results showed that the techniques analyzed in our study are able to early identify students likely to fail, the effectiveness of some of these techniques is improved after applying the data preprocessing and/or algorithms fine-tuning, and the support vector machine technique outperforms the other ones in a statistically significant way.},
keywords = {Artificial intelligence in education,Automatic instructional planner,Automatic prediction,Educational data mining,Interactive learning environment,Learner modeling},
file = {/home/charlotte/sync/Zotero/storage/WRKXYMV5/Costa et al. - 2017 - Evaluating the effectiveness of educational data m.pdf;/home/charlotte/sync/Zotero/storage/BGHUVLVT/S0747563217300596.html}
}
@article{crickAnalysisIntroductoryProgramming2017,
title = {An {{Analysis}} of {{Introductory Programming Courses}} at {{UK Universities}}},
author = {Crick, Tom},
year = {2017},
journal = {{The Art, Science, and Engineering of Programming}},
volume = {1},
number = {2},
issn = {2473-7321},
file = {/home/charlotte/sync/Zotero/storage/X4THCVSY/cronfa43520.html}
}
@article{dalyPatternsPlagiarism2005,
title = {Patterns of Plagiarism},
author = {Daly, Charlie and Horgan, Jane},
year = {2005},
month = feb,
journal = {{ACM SIGCSE Bulletin}},
volume = {37},
number = {1},
pages = {383--387},
issn = {0097-8418},
doi = {10.1145/1047124.1047473},
url = {https://dl.acm.org/doi/10.1145/1047124.1047473},
urldate = {2024-02-09},
abstract = {We used a new technique to analyse how students plagiarise programs in an introductory programming course. This involved placing a watermark on a student's program and monitoring programs for the watermark during assignment submission. We obtained and analysed extensive and objective data on student plagiarising behaviour. In contrast to the standard plagiarism detection approaches based on pair comparison, the watermark based approach allows us to distinguish between the supplier and the recipient of the code. This gives us additional insight into student behaviour. We found that the dishonest students did not perform significantly worse than the honest students in the exams. However, when dishonest students are further classified into supplier and recipient, it emerged that the recipient students performed significantly worse than the suppliers.},
keywords = {automatic evaluation,introductory computer programming,plagiarism,watermarks},
file = {/home/charlotte/sync/Zotero/storage/4HCXLJA3/Daly and Horgan - 2005 - Patterns of plagiarism.pdf;/home/charlotte/sync/Zotero/storage/BL28PSWT/daly2005.pdf.pdf}
}
@techreport{danielsonFinalReportAutomated1976,
title = {Final {{Report}} on the {{Automated Computer Science Education System}}},
author = {Danielson, R. L. and Others, And},
year = {1976},
month = jun,
url = {https://eric.ed.gov/?id=ED125599},
urldate = {2024-02-07},
abstract = {At the University of Illinois at Urbana, a computer based curriculum called Automated Computer Science Education System (ACSES) has been developed to supplement instruction in introductory computer science courses or to assist individuals interested in acquiring a foundation in computer science through independent study. The system, which uses PLATO terminals, is presently in routine use in several courses at the University of Illinois, and it has been used at Wright Community College in Chicago. Recent changes in programing and technical innovations have increased its instructional effectiveness. The first section of this report describes the goals and design of ACSES. Later sections provide yearly reviews of progress made for the duration of a grant from the National Science Foundation. (EMH)},