Transferring programming skills learned in the classroom to diverse real-world scenarios is both essential and challenging in computing education. This experience report describes an approach to facilitate learning tr...
详细信息
ISBN:
(纸本)9798400705328
Transferring programming skills learned in the classroom to diverse real-world scenarios is both essential and challenging in computing education. This experience report describes an approach to facilitate learning transfer by fostering adaptive expertise. Students were engaged in co-creating contextualized worked-out examples, including step-by-step solutions. Through three homework assignments in a Spring 2023 database programming course, we observed substantial improvements, where students generated detailed and accurate solutions and enriched their problem-solving contexts from simple phrases to detailed stories, drawn from 17 real-life scenarios. Our results also suggest that the peer assessment process cultivated a supportive learning environment and fostered adaptive expertise. We discuss the lessons learned and draw pedagogical implications for integrating student-generated contextualized materials in other programming courses.
Image style transfer is an applied task for automatic rendering of the original image (content) in the style of another image (specifying the target style). Traditional image stylization methods provide only a single ...
详细信息
Image style transfer is an applied task for automatic rendering of the original image (content) in the style of another image (specifying the target style). Traditional image stylization methods provide only a single stylization result. If the user is not satisfied with it due to stylization artifacts, he has to choose a different style. The work proposes a modified stylization algorithm, giving a variety of stylization results, and, as user review shows, achieves improved stylization quality by using additional style information from similar styles.
Link-flood attacks (LFAs) overwhelm bandwidth on links in a network using traffic from many sources, which is indistinguishable from benign traffic. Unfortunately, traditional DDoS defenses are incapable of stopping s...
详细信息
Link-flood attacks (LFAs) overwhelm bandwidth on links in a network using traffic from many sources, which is indistinguishable from benign traffic. Unfortunately, traditional DDoS defenses are incapable of stopping such attacks and recently proposed software-defined solutions are ineffective. In this work, we observe a new opportunity for mitigating LFAs using optical networking advances. In essence, we envision new capabilities for topology programming, to scale capacity on-demand to avoid congestion and add new links to the network to create new paths for traffic during LFA incidents. Realizing these benefits of optical topology programming raises unique challenges;the search space for candidate topology configurations is very large and joint optimization of topology and routing is NP-hard. We present ONSET-a framework that tackles these challenges to lay a practical foundation for topology programming-based defenses against LFAs. We show that ONSET complements existing programmable network defenses and amplifies their benefits. We perform a what-if style analysis of ONSET by simulating a wide-ranging set of attacks, including terabit-scale attacks against every single link, on five networks with two different routing capabilities and observe that ONSET provides the means to mitigate congestion loss in more than 90% of the hundreds of diverse attack scenarios considered.
This work presents an experimental analysis of first-grade students' block-based programming trajectories. These trajectories consist of edit-level program snapshots that capture learners' problem-solving proc...
详细信息
ISBN:
(纸本)9798400706004
This work presents an experimental analysis of first-grade students' block-based programming trajectories. These trajectories consist of edit-level program snapshots that capture learners' problem-solving processes in a navigational microworld. Our results highlight the potential of this fine-grained data capture. Snapshot frequencies in trajectories collected before and after a coding intervention showcase the collective progress of the learners. Graph visualizations, in which nodes represent snapshots and directed edges code edits, highlight strategies, pitfalls and debugging procedures. Individual programming trajectories shed light on details of learners' problem-solving processes that less granular analysis would conceal. Various works in the field of Learning Analytics research show the usefulness of collecting fine-grained process data that proceed from programming activities. However, how to analyze this data is still an open question and research on the subject is in an experimental phase. We contribute to this experimentation by analyzing and discussing results collected from 30 first-grade students in a pretest-posttest study.
The emergence of large language models (LLMs) has transformed research and practice across a wide range of domains. Within the computing education research (CER) domain, LLMs have garnered significant attention, parti...
详细信息
ISBN:
(纸本)9798400705328
The emergence of large language models (LLMs) has transformed research and practice across a wide range of domains. Within the computing education research (CER) domain, LLMs have garnered significant attention, particularly in the context of learning programming. Much of the work on LLMs in CER, however, has focused on applying and evaluating proprietary models. In this article, we evaluate the efficiency of open-source LLMs in generating high-quality feedback for programming assignments and judging the quality of programming feedback, contrasting the results with proprietary models. Our evaluations on a dataset of students' submissions to introductory Python programming exercises suggest that state-of-the-art open-source LLMs are nearly on par with proprietary models in both generating and assessing programming feedback. Additionally, we demonstrate the efficiency of smaller LLMs in these tasks and highlight the wide range of LLMs accessible, even for free, to educators and practitioners.
Rethinking our teaching practices and forms, whether due to world events such as the pandemic or the particularities of our reality, such as social and economic conditions, is necessary. This work presents an open-sou...
详细信息
ISBN:
(纸本)9783031622441;9783031622458
Rethinking our teaching practices and forms, whether due to world events such as the pandemic or the particularities of our reality, such as social and economic conditions, is necessary. This work presents an open-source and universal cross-compilation tool for programming Embedded Systems: eUCCvm. It is possible to develop application programming activities for Embedded Systems on multiple architectures through its use. eUCCvm can be used in academic and work fields and any modality, whether virtual or in-person. Finally, we will present a brief survey about its inclusion in some University subjects at the Universidad Tecnol ' ogica Nacional, Regional Mendoza.
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its *** current WMC solvers work on Conjunctive Normal Form(CNF)***,CNF is not a natural representation for human-being in many *** by the stronger expressive power of Pseudo-Boolean(PB)formulas than CNF,we propose to perform WMC on PB *** on a recent dynamic programming algorithm framework called ADDMC for WMC,we implement a weighted PB counting tool *** compare PBCounter with the state-of-the-art weighted model counters SharpSAT-TD,ExactMC,D4,and ADDMC,where the latter tools work on CNF with encoding methods that convert PB constraints into a CNF *** experiments on three domains of benchmarks show that PBCounter is superior to the model counters on CNF formulas.
Developers integrate web Application programming Interfaces(APIs)into edge applications,enabling data expansion to the edge computing area for comprehensive coverage of devices in that *** develop edge applications,de...
详细信息
Developers integrate web Application programming Interfaces(APIs)into edge applications,enabling data expansion to the edge computing area for comprehensive coverage of devices in that *** develop edge applications,developers search API categories to select APIs that meet specific ***,the accurate classification of APIs becomes critically ***,existing approaches,as evident on platforms like ***,face significant ***,sparsity in API data reduces classification accuracy in works focusing on single-dimensional API ***,the multidimensional and heterogeneous structure of web APIs adds complexity to data mining tasks,requiring sophisticated techniques for effective integration and analysis of diverse data ***,the long-tailed distribution of API data introduces biases,compromising the fairness of classification *** these challenges,we propose MDGCN-Lt,an API classification approach offering flexibility in using multi-dimensional heterogeneous *** tackles data sparsity through deep graph convolutional networks,exploring high-order feature interactions among API ***-Lt employs a loss function with logit adjustment,enhancing efficiency in handling long-tail data *** results affirm our approach's superiority over existing methods.
Given a set of squares and a strip with bounded width and infinite height, we consider a square strip packaging problem, which we call the square independent packing problem (SIPP), to minimize the strip height so tha...
详细信息
Given a set of squares and a strip with bounded width and infinite height, we consider a square strip packaging problem, which we call the square independent packing problem (SIPP), to minimize the strip height so that all the squares are packed into independent cells separated by horizontal and vertical partitions. For the SIPP, we first investigate efficient solution representations and propose a compact representation that reduces the search space from Omega(n!) to O(2n), with n the number of given squares, while guaranteeing that there exists a solution representation that corresponds to an optimal solution. Based on the solution representation, we show that the problem is NP-hard. To solve the SIPP, we propose a dynamic programming method that can be extended to a fully polynomial-time approximation scheme (FPTAS). We also propose three mathematical programming formulations based on different solution representations and confirm their performance through computational experiments with a mathematical programming solver. Finally, we discuss several extensions that are relevant to practical applications.
The majority of Nigerian high schoolers have little to no exposure to the basics of algorithms and programming. We believe this trajectory should change as programming offers these students, especially those from indi...
详细信息
ISBN:
(纸本)9798400704239
The majority of Nigerian high schoolers have little to no exposure to the basics of algorithms and programming. We believe this trajectory should change as programming offers these students, especially those from indigent backgrounds, an opportunity to learn profitable skills and ignite their passions for problem-solving and critical thinking. NaijaCoder is an organization that is dedicated to organizing a free, intensive summer program in Nigeria to teach the basics of algorithms and computerprogramming to high schoolers. However, the adoption of computerscience curriculum has been especially challenging in countries in the global south that face unique challenges-such as unstable power supply, internet service, and price volatility. We design a curriculum that is more conducive to the local environment while incorporating rigorous thinking and preparation. Using basic survey designs, we elicit feedback, from the students, designed to further improve and iterate on our curriculum.
暂无评论