Crowdcoding is a programming model that outsources a software project implementation to the crowd. As educators, we think that crowdcoding could be leveraged as part of the learning path of engineering students from a...
详细信息
Crowdcoding is a programming model that outsources a software project implementation to the crowd. As educators, we think that crowdcoding could be leveraged as part of the learning path of engineering students from a computerprogramming introductory course to solve local community problems. The benefits are twofold: on the one hand the students practice the concepts learned in class and, on the other hand, they participate in real-life problems. Nevertheless, several challenges arise when developing a crowdcoding platform, the first one being how to check the correctness of student's code without giving an extra burden to the professors in the course. To overcome this issue, we propose a novel system that does not resort to expert review;neither requires knowing the right answers beforehand. The proposed scheme automatically clusters the student's codes based solely on the output they produce. Our initial results show that the largest cluster contains the same codes selected as correct by the automated and human testing, as long as some conditions apply.
Providing students feedback on their exercise solutions is a crucial element of computer programming education. Such feedback can be generated automatically and can take various forms. This paper introduces and propos...
详细信息
Providing students feedback on their exercise solutions is a crucial element of computer programming education. Such feedback can be generated automatically and can take various forms. This paper introduces and proposes the use of visual profiles of code solutions as a form of automatically generated feedback to programming students. The visual profiles are based on the frequency of code elements belonging to six distinct classes. The core idea is to visually compare a profile of a student-submitted solution code to the range of profiles of accepted solutions (including both reference solutions provided by instructors and solutions submitted by students who successfully passed the same exercise earlier). The advantages of the proposed approach are demonstrated on a number of examples based on real-world data.
The Communications Web site, http://***, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter at htt...
详细信息
The Communications Web site, http://***, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
twitter
Follow us on Twitter at http://***/blogCACM
http://***/blogs/blog-cacm
Philip Guo offers programmers 'Opportunistic programming' tips that typically are not shared in school.
作者:
Gill, T. GrandonUniv S Florida
Coll Business Adm Informat & Decis Sci Dept 4202 East Fowler AveCIS1040 Tampa FL 33620 USA
The technical component of Management Information Systems (MIS) programs canbe challenging to design. Unlike computer science students, MIS majors tend to take relatively fewtechnical courses, yet are expected to grad...
详细信息
The technical component of Management Information Systems (MIS) programs canbe challenging to design. Unlike computer science students, MIS majors tend to take relatively fewtechnical courses, yet are expected to graduate with a broad array of computer skills. To meet theseexpectations, foundation courses are often designed to serve multiple objectives. For example, as afirst course in an upper division undergraduate MIS major, the author teaches an introductoryprogramming course in the C++ language. Beyond teaching the basic elements of programming andcomputer architecture, that course is expected to explore data representation (a foundation for datacommunications), the file-handling concepts (the building block of databases), and basicapplication construction (a core concept of systems analysis and design).
The Communications Web site, http://***, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter at htt...
详细信息
The Communications Web site, http://***, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
twitter
Follow us on Twitter at http://***/blogCACM
http://***/blogs/blog-cacm
Mark Guzdial writes about why teachers must grasp introductory CS students' theories about computing. Bertrand Meyer argues for the necessity of analyzing large-scale software disasters and publishing a detailed technical study.
In this paper, the application of instant messaging (IM) in programming training is argued to be possible and inevitable, especially in the high schools/colleges of poor communities. However, challenges in its applica...
详细信息
In this paper, the application of instant messaging (IM) in programming training is argued to be possible and inevitable, especially in the high schools/colleges of poor communities. However, challenges in its application were noted. These challenges of utilising IM and the reluctance of the students in applying it in their programming training acted as a motivation for the study. Our aim is to use IM for a different purpose than its original intention. Critical systems heuristics was used as a multi-methodological framework for the incorporation of various conditioned realities, where the technological pedagogical content knowledge framework was applied to incorporate the applicable technological, pedagogical, content areas. The guidelines were enhanced from knowledge gained from an action research project with trainee teachers. This iterative process demonstrates the incorporation of both theoretical and empirical context-based perspectives into the understanding and addressing of a problem environment.
暂无评论